DESIGNING AND EXPLORING DIFFERENT LEVELS OF CYBERHUNTS by André du Plessis Nelson Mandela Metropolitan University Port Elizabeth South Africa SchoolNet South Africa Bloemfontein 4-6 July 2007-06-20 Page 1 of 64 CONTENTS 1 DESIGNING AND EXPLORING DIFFERENT LEVELS OF CYBERHUNTS 4 2 OUTCOMES OF CYBERHUNT WORKSHOP 30 3 HOW TO MAKE HYPERLINKS IN WORD 34 4 STEPS FOR CREATING A CYBERHUNT 37 5 EXAMPLES OF CYBERHUNTS Volcanoes (Word) Addo (Word) Ecology (PowerPoint) 41 6 POWERPOINT PRESENTATION ON CYBERHUNTS 49 Page 2 of 64 PAPER DESIGNING AND EXPLORING DIFFERENT LEVELS OF CYBERHUNTS Page 3 of 64 DESIGNING AND EXPLORING DIFFERENT LEVELS OF CYBERHUNTS André du Plessis Nelson Mandela Metropolitan University Science, Mathematics and Technology (SMATE) Port Elizabeth South Africa andre.duplessis@nmmu.ac.za 041-5044033 1. INTRODUCTION Over the past years, the South African public had to hear on numerous occasions in Sunday newspapers, such as Rapport (Le Cordeur, 2005; Retief, 2003), that South African school learners are not on par in mathematics and science with the rest of the world. Another frequently heard argument is that our children cannot read properly, lack proper comprehension skills and are not interested in what schools have to offer related to teaching and learning. The draft white paper on e-Learning (DOE, 2002) informed us that there is also a serious backlog related to Information and Communications Technology ICT) implementation and integration within the curriculum in our schools. This draft white paper of the Department of Education (DOE) suggested time frames that need to be adhered to, to ensure that South Africa addresses this digital divide issue. The problem with the 2002 white paper is that a great deal is written about the learning envisioned, the kind of ICT levels that need to be developed, the type of school envisioned, etc. BUT one fundamental aspect is missing, namely: How do teachers and schools practically integrate or make use of ICT? Instead of being a critic, I would like to propose that Cyberhunts could be one of the many solutions in which ICT could be utilized to tackle the reading problem. As a result, I will be trying to address the following questions in this paper: (1) Why is reading important and what can be done to assist our teachers to re-cultivate an interest in reading? (2) What learning theory does cyberhunts subscribe to? (3) What is a cyberhunt and what is a webquest? (4) How does a pre-designed cyberhunt look? (5) What is a horizontal and what is a vertical cyberhunt? (6) Where do one start and where do one work towards to? (7) How can Information and Communication Technology (ICT) via Cyberhunts assist teachers with this reading issue? (8) How do we develop Cyberhunts? Page 4 of 64 2. THE READING ISSUE These issues are serious ones that need to be addressed. A fundamental skill that could influence learning, is reading. It seems that the reading issue can be divided into two sections, namely those who cannot read (illiterate) and those who can read (Healy, 1990). That it is important to be empowered to be able to read, is a fundamental right. However, a problematic area is that many people who are able to read, cannot read well, do not read often or do not want to read at all. Healy (1990:23) contends that learners are becoming more and more “alliterate” (sic), “persons who know how to read [the mechanics], but who do not choose to read … They do not read for pleasure, nor do they read extensively for information” (Healy, 1990:20). According to Healy (1990) an alliterate person functions on the surface level and is not much better off than an illiterate person, one who cannot read at all. Reading is a skill that needs to be developed from an early age as we are being bombarded with written symbols in our everyday life. To be able to stay afloat, instead of sinking, in these “oceans of data”, learners would have to be taught how to filter information and to distinguish between what is relevant and what is not (Eriksen, 2001) as: “A crucial skill in [an] information society consists of protecting oneself against the 99.99 per cent of the information offered that one does not want (and, naturally, exploiting the last 0.001 per cent in a merciless way)” (Eriksen, 2001:17). Egol (cited in Keller & Reigeluth, 2004) is in agreement that reading is a key and basic skill that needs to be mastered as he argues that reading, speed reading, effective writing, research, note taking, presentation, listening, dialogue and logic are the new basics that need to be taught and practised. Plain reading without understanding is not the focus, but what is being advocated is the importance of being able to ascertain whether learners (children or adults) understand what they have learned and whether they can assimilate, accommodate or (re)construct their new acquired knowledge (Du Plessis, 2003). Dochey (2001) and the DOE (1997a:IS) argue even further that understanding is not enough, but that we need to equip our learners with the necessary skills to become life-long learners with the capacity not only to locate and read information, but also to use information in meaningful ways. It seems, therefore, that there should be a shift from “how much” knowledge can be conveyed to “how well” learners (or adults) can use or manage information or internalized knowledge (Du Plessis, 2003). Hence, one could postulate that reading without thinking is not reading. Page 5 of 64 Perkins (1986) and Healy (1990) argues that one of the reasons why children do not engage on a regular basis in thinking, is that teachers do not provide enough opportunities for active thinking through dialogue and product creation. Healy (1990 argues further that the over exposure of learners to visual material contributes to learners who think less and read less and as a result, many learners “have trouble with the mental organization and sustained effort demanded by reading” (Healy, 1990:24). Hence, learners find books hard to read and encounter difficulties with the interpretation of verbal logic, as reading as well as concentration, demand more focused and mentally applied concentration (Healy, 1990). The result: Learners cannot concentrate for long periods of time and thus we have a “Two-Minute Mind” generation (Healy, 1990). If our learners are being over exposed by visual material such as the television and the computer, then one would have to ask oneself: Is it possible to utilize these media to benefit reading? If the answer is yes, then we have to ask what possible ways can be implemented. I belief that it is time that we must try to make education what Dewey referred to as being life itself and not the mere preparation for life. Therefore, the time has come that school classrooms should become environments that are conducive to learning, classrooms that imitate real life and classrooms that make extensive use of ICT. I further believe that ICT can play a pivotal role to assist in developing reading for understanding. This is in agreement of the plea of Nations (2001) who asks appropriately, how long do our children have to wait for change regarding pedagogy and technology integration in education and thinking, as “Our perceptions about what schooling should look like are a mismatch with the reality of today’s children” (Nations, 2002:IS-1)1. Perkins (1991, 1992) argues that schools’ have three educational goals to fulfil, namely, (1) the retention of knowledge, (2) understanding of knowledge and (3) the active use of knowledge. I am of the belief that Cyberhunts could assist to address the above-mentioned issues. But what is a Cyberhunt? 3. CYBERHUNTS AND LEARNING THEORY Cyberhunts subscribe to the principles of constructivism as a learning theory. However, before these principles are explored, one needs to take note from where the South African educational system comes, namely the objectivist behaviouristic tradition. “The objectivist model of curriculum, located in 1 The abbreviation IS in this paper refers to an Internet Source that has been quoted. A problem that one encounters when working with some Internet resources is that some do not contain page numbers. If a source does not contain page numbers, the source has been previewed in print mode for printing on an A4 size page and the page numbering that the browser indicated, has been used. Page 6 of 64 behavioural theory, has arguably had the greatest influence on Western curriculum development and therefore in the shaping of school discourse in this century” (Van Harmelen, 1995:51). Subscribing to the objectivist behaviouristic tradition implies that the focus is on transfer of knowledge and instructivism with the main focus on rote-learning and recall. The focus is on teaching, not learning, as learners are instructed in a context dominated by teacher talk. In this context the teacher is active and the learner is passive as he/she has to listen all the time, leading to the analogy of learners being empty buckets that need to be filled or the “jug and mug” approach. The problem with this aim is that it is not possible to know everything, as there is too much information2 (knowledge) available: knowledge is not finite (Nations, 2001; Dochy, 2001). An alternative to the objectivist tradition seems to be constructivism. Constructivism is a theory of “‘knowing’ and a theory about how one ‘comes to know’ “, hence a theory about knowledge and learning and not a theory about teaching (Fosnot, 2005:ix). Constructivism refers to the active construction of knowledge (not the passive consuming of information) by individuals through a social process in real life contexts (Gagnon and Collay, 2001; Marlowe & Page, 2005). Hence, it is about understanding, applying, thinking and analyzing and not about accumulating, memorizing and repeating of information (Marlowe & Page, 2005). The focus should be on authentic and meaningful learning through a process of bridge building between what students already know and what they are expected to learn resulting in the creation of artifacts that presents their thinking (Gagnon and Collay, 2006). Therefore, for learning to become meaningful, it has to transcend the focus on mere factual information as “meaning assigned to facts and facts alone are meaningless until they are interpreted and added up into a coherent picture” (Hinchey, 1998:45). Constructivism is the learning theory that underpins Outcomes Based Education (OBE) of the South African curriculum (Moll, 2002). The envisioned constructivist learning, one could argue, has as its aim that learning has to become meaningful, which is in contrast to traditional rote learning. Jonassen, Howland, Moore and Mara (2003:6) define meaningful learning simply as that “which occurs when students are [actively] making meaning”. They go on to explain their conception of meaningful learning as learning that displays the following five attributes (Jonassen, Peck & Wilson, 1999; Jonassen, Howland, Moore and Mara, 2003): 2 It is important to note that information cannot necessarily be equated with knowledge. For information to become knowledge, we have to internalize (accommodate or assimilate) information in a comprehensible way. Page 7 of 64 Active, manipulative, observant Constructive, articulative, reflective Intentional, reflective, regulatory Authentic, complex, contexutal Cooperative, collaborative, conversational Table 1 shows how the Critical Outcomes are related to “What is Learning” as viewed by theorists such as Jonassen, Peck and Wilson (1999) and Jonassen, Howland, Moore and Mara (2003). CRITICAL OUTCOMES WHAT IS LEARNING? WHAT IS MEANINGFUL LEARNING? Manage themselves responsibly Collect and analyze information Thinking Skills Constructive, Articulative, Reflective Communicate effectively Social Negotiation Information Processing Knowledge Construction Cooperative, Collaborative, Conversational Authentic, Complex, Contexutal Identify and solve problems by means of critical and creative thinking Work together in teams Use science and technology effectively Information Processing Remembering and Recalling Thinking Skills Knowledge Construction Conceptual Change Contextual Change Activity Distributed among the Community Chaos Social Negotiation Knowledge Construction Activity Distributed among the Community Conceptual Change Active, Manipulative, Observant Constructive, Articulative, Reflective Intentional, Reflective, Regulatory Authentic, Complex, Contexutal Cooperative, Collaborative, Conversational Active, Manipulative, Observant Intentional, Reflective, Regulatory Cooperative, Collaborative, Conversational Constructive, Articulative, Reflective Knowledge Construction Constructive, Articulative, Reflective Conceptual Change Contextual Change TABLE 1: LINKING THE CRITICAL OUTCOMES (DOE, 1997A:IS-19; DOE, 1997B:13-14) TO “WHAT IS LEARNING” AS SEEN BE VARIOUS THEORISTS AND “WHAT IS MEANINGFUL LEARNING” (JONASSEN, PECK & WILSON, 1999 AND JONASSEN, HOWLAND, MOORE AND MARA, 2003) See the world as set of related contexts In addition, Jonassen, Peck and Wilson (1999) and Jonassen, Howland, Moore and Mara, 2003) advocate the forming of communities namely: (1) discourse communities, (2) communities of practice, (3) knowledge building communities and (4) learning communities. Cyberhunts as a reading and learning strategy could assist to achieve meaningful learning as learners are active when they are engaged, they observe the websites that they visit on the Internet and they could engage with the content in a meaningful manner. If the planned cyberhunt is linked to the outcomes of the curriculum, it fosters authentic and contextual learning. In addition, the level of questioning, provide opportunities for Page 8 of 64 more complex thinking and learning. Furthermore, cyberhunts could also provide opportunities for reflection. However, teachers need make to design and include reflective activities and have to think at what stage to make use of it. As cyberhunts can be used by individuals or in group context, it provides also opportunities for cooperative, collaborative and conversational learning, which are all elements of meaningful learning. 4. CYBERHUNTS AND WEBQUESTS: A BRIEF INTRODUCTION AND SOME DIFFERENCES The term Cyberhunt would probably not be found in a dictionary of the 1990’s or in a contemporary one. This could possibly be attributed to the fast development of the Information Society and ICT area. Cyberspace is a term that we can attribute to ICT and the Internet. The term “hunt” refers to finding or searching for something. Therefore a cyberhunt refers to an online activity where learners are using the Internet as a tool to find answers to questions (Rechtfertig, 2002) based upon a certain theme or topic that has been composed by someone else. Teachers may use cyberhunts as an introduction to a theme in a pre-activity or as a review for an upcoming test or other form of authentic assessment (Slayden, 2000). The advantage for teachers is twofold: (1) they learn valuable ICT skills while designing cyberhunts and (2) they start to use ICT in an integrative manner (Rechtfertig, 2002:IS) within their learning area. These skills include searching the Internet by making use of search engines, the identification and evaluation of the level and appropriateness of websites to be included for their cyberhunts, the use of different levels of questioning techniques (See Taxonomy of questions in Table 1), the deployment of their cyberhunts either on the local server or online and how to manage the classroom within a cyberhunt context (Starr, 1999; Slayden, 2000; Rechtfertig, 2002). In addition, cyberhunts can be used to encourage cooperation through group work and cooperative learning, but it can also be used individually on a one-to-one basis (Star, 1999; Slayden, 2000). Learners can also benefit from using cyberhunts (Rechtfertig, 2002) as they (1) learn the basics of web navigation, (2) are introduced to online reading for information gathering for meaning, (3) learn how respond to comprehension questions either by typing the answers online or by writing it in pencil and (4) being prepared for more complex online internet based activities for the future such as designing their own cyberhunts. Cyberhunts and Web Quests are not the same. Cyberhunts are short in duration, from 30 minutes to 1 hour, but nothing prohibits one from designing one for a longer duration. A cyberhunt does not have to Page 9 of 64 have a conclusion in the form of a product that needs to be created. If a cyberhunt becomes product orientated, it starts to move in the direction of a webquest. A webquest is “an inquiry based activity in which all or most of the resources are Internet-based” (Dodge, 1997:IS-1). Two types can be defined, namely short term and long term webquests. A short term webquest is normally designed to be completed in one to three class periods where a long term webquest’s duration may vary from one week to a month (Dodge, 1997). To be classified as a webquest, the following parts are a prerequisite (Dodge, 1997; Schweizer and Kossow, 2007): Introductory Section Do-able Task Section Information Resources Section Description of the Process to be followed Section Guidance Section Evaluation or Assessment Section Conclusion Section Some teachers may group some of these above-mentioned sections together such as resources and processes (Schweizer and Kossow, 2007) where others could extend it even further. In the introduction, the learners are introduced to the quest or project in an interesting manner to gather their attention and to motivate them. The Doable Task refers to a product that the learners have to produce that will indicate their success. The Information Resources refer to web documents, web links, books, email addresses of experts, online databases, etc. which can be explored to assist them to complete the task. In the Process Section the learners are being provided with a clear step-by-step process to be embarked upon to complete the task at hand. The Guidance Section provides ideas on how the learners have to organize the gathered required information. In the Evaluation Section, the learners have access to the tools that will be used for assessment purposes. The Conclusion Section provides opportunities for further learning, the extension of learner experiences and/or reflection opportunities (Dodge, 1997; Schweizer & Kussow, 2007). The best advice that I can provide to teachers when they ask “what is a cyberhunt or a webquest and how do I design one”, is to encourage them to actually search for pre-designed webquests, to explore them, to actually participate in one or two and then to design one based upon what has been experienced. Page 10 of 64 5. EXAMPLES OF CYBERHUNTS A few examples of cyberhunts and a brief description of each follow to indicate its flexibility. In some instances, learners are required to open a pre-created file from a folder on the network or on the Internet that contains questions with hyperlinks below each 3[See Example 1]. Learners then have to click on these hyperlinks which in return open the referenced to website that needs to be explored by learners to find the answers to these questions. Learners type the answers on their computers and save or print them in order that the teacher or peers may assess it. Alternatively, the questions are provided on paper with hyperlinks below each one [See Example 2]. Learners then have to type these hyperlinks in the address bar of their web browser which in return open the reference to website that needs to be explored by learners to find the answers to these questions. The learners then write the answers on paper or type it in a word processor. Should they use a word processor, they either print their final answers or save it in order that they or their teacher may have access to it for further use or/and assessment. 3 The following examples of Cyberhunts were designed in 2006 by students who attended the PEC203 module at the Nelson Mandela Metropolitan University. Unfortunately not all students saved their cyberhunts under their student number and/or name. Those who have, have been acknowledged. You will also note that the students have indicated the level of the question by using the taxonomy of Bloom: knowledge, comprehension, application, analysis, synthesis or evaluation. Page 11 of 64 BY JASMIN HACK Instructions Fill in your name and student number You will find several questions that are related to various websites. To answer each question you will need to click on the blue highlighted web address which will take you to the website that will offer the information needed to answer the questions. Answer all questions on the page. Once you have completed your work, save it under your name and surname in the folder named VolcanoesGrade6A. Name and Surname Grade Date Question 1 (Comprehension) What would you do if a volcano erupts? http://vulcan.wr.usgs.gov/Hazards/Safety/what_to_do.html Answer Question 2 (Knowledge) List all the Volcanoes in Tanzania. http://volcano.und.edu/vwdocs/volc_images/africa/africa.html Answer Question 3 (Knowledge/ Analysis By looking at the map and information related to the dispersal of volcanoes, identify the area which is most dense. Roughly how many volcanoes would you say there are? http://www.geo.mtu.edu/volcanoes/world.html Answer Question 4 (Evaluation) Read the differences between shield and strato volcanoes and explain the differences between each volcano. http://volcano.und.edu/vwdocs/vwlessons/volcano_types/index.html Answer Question 5 (Synthesis) Explain a Volcanologist’s occupation. http://volcano.und.edu/vwdocs/how_to.html Answer Question 6 (Application) What are ophiolites? http://volcano.und.edu/vwdocs/vw_hyperexchange/ophiolites.html Answer Page 12 of 64 Question 7 (Evaluation) Compare and contrast the largest eruptions in 10,000 years in Europe with that of South America. http://volcano.und.edu/vwdocs/vw_hyperexchange/veiTables/s_america.html Answer Question 8 (Knowledge) How many times has Mount St Helens erupted in the past 10, 000 years? http://volcano.und.edu/vwdocs/vw_hyperexchange/veiTables/usa.html Answer Question 9 (Synthesis) Identify the various parts of a volcano. http://volcano.und.edu/vwdocs/vw_hyperexchange/parts.html Answer Question 10 (Analysis) Give examples of colossal, super-colossal and mega-colossal volcanoes. http://volcano.und.edu/vwdocs/eruption_scale.html Answer Question 11 (Knowledge) How often do explosive volcanoes erupt? http://volcano.und.edu/vwdocs/eruption_scale.html Answer Question 12 (Evaluation) Compare the differences between a cow-pie bomb and a bread crust bomb. http://www.gc.maricopa.edu/earthsci/imagearchive/bombs.htm Answer Question 13 (Analysis) List the ten deadliest eruptions. http://volcano.und.edu/vwdocs/vw_hyperexchange/deadly_volcs.html Answer Question 14 (Analysis) Identify the different sectors that are affected in volcanic eruptions. Which are most affected? http://volcano.und.edu/vwdocs/vw_hyperexchange/CostVolc.html Answer Question 15 (Application) Show how the various gases involved in volcanic eruptions can affect our lives. http://volcano.und.edu/vwdocs/Gases/man.html Answer Example 1: Volcanoes cyberhunt that provides space for learners to write or type their answers below the questions. Other examples of cyberhunts have one hyperlink and several questions that refer to the website which are opened after the learner has clicked on the hyperlink. Learners can then complete the questions either on screen or on paper. The specific example on the next page has not provided space for the learners to type their answers on screen, as this design requires learners to write the Page 13 of 64 answers on paper (See Example 2 4). However, nothing prohibits one from inserting spaces for the learners to enable them to type on screen at a later stage. A VISIT TO ADDO ELEPHANT PARK Answer the questions on your printed worksheets. Click on the blue links to go to a website which has the information you need to answer the questions listed below it. What to see and do in Addo http://www.nature-reserve.co.za/cape-eastern-addo-elephant-park.html 1. (Know) How many elephants are there in the Addo Elephant Park? (350) 2. (Know) How far away from Port Elizabeth is the Addo Elephant Park? (72 km) 3. (Know) Name three other kinds of large animals you could expect to see in Addo. (Rhino, Buffalo, Eland, Kudu, Bush Pig, Red Hartebeest, Jackal) 4. (Comp) What is another name for a suricate? Describe one in a sentence.( Meerkat or mongoose, small grey/brown animal with dark-ringed eyes, sits up on hindlegs) 5. (Comp) What do you think is the main thing visitors to Addo, do? (i.e. what is the most popular activity) (Game drives) 6. (Comp) What other activities are there? (Name at least 3). (Hiking, horse-trails, swimming, 4X4 trails, bird-watching) Accommodation at Addo http://www.sanparks.org/parks/addo/ 7. (Know) What are the main kinds of different accommodation at Addo? Name at least five kinds. (Chalets, rondawels, camping, safari tents, forest cabins, guest houses) 8. (Appl) How many safari tents are available for the night of 1 September 2006? 9. (Know) How many people can sleep in each tent? (2) 10. (Comp) Describe a safari tent in your own words (Hint: find some pictures). (Luxury tent with beds and balcony area). 11. (Appl) How much would it cost for a family of 2 adults and 2 children to share a Forest Cabin on the night of 1 September 2006? (R350 + R104 + R52 = R511) 12. (Comp) Which number would you phone to book your reservation? (012 428 9111) Getting there http://www.sanparks.org/parks/addo/ 13. (Anal) If you were going to drive to Addo from Port Elizabeth, which route would you take? (Give the route numbers of the major roads you would take). (N2 + R335 or N2 + N10 + R342) 14. (Appl) How long do you think it would take to get there? Justify your answer. (72 km, average speed 80kph so about 1 hour) Other game parks http://www.shamwari.com 15. (Appl) Someone has told you that Shamari is a very good game park. How much would it cost for two people to spend one night in the Long Lee Manor lodge on 1 September 2006? (R 2560.00 X 2 = R5120.00) 16. (Eval) What sort of tourists do you think Shamwari is trying to attract? Give a reason for your answer. (Wealthy overseas tourists, because it’s so expensive) 17. (Synth) Plan a trip to Addo for a family of 2 adults and 2 children. Specify your itinerary and budget (what time would you leave, what would you do when you were there, where would you stay, how much money would you need for the trip). Example 2: A visit to Addo Elephant Park cyberhunt that does not provide space for learners to write or type their answers below the questions. Another positive aspect of Cyberhunt design, is that the designer is not limited to use a word processor such as Microsoft Word or web authoring software such as FrontPage, but that virtually any 4 Unfortunately I do not have the details of this student. Page 14 of 64 software can be used, even presentation software, for example Microsoft PowerPoint. The following example [See Example 3] has been created by a student during the PEC203 module at the Nelson Mandela Metropolitan University in PowerPoint on Ecology for Grade 9 learners. ECOLOGY Grade 9 Let’s discover the world in which we live! Introduction to Ecology Check out the website Kids Do Ecology and its related links and after exploring, answer the questions that follow… http://www.nceas.ucsb.edu/nceasweb/kids/ecology/index.html • • • Define the term ecology. Name three jobs you could do after becoming an Ecologist Why is Ecology important? Page 15 of 64 Biomes http://www.nceas.ucsb.edu/nceasweb/kids/biomes/what_biomes_are.htm 4. Explain what a biome is in your own words. 5. The biomes are separated into two general classifications. Name them 6. List the 12 Biomes of the World 7. Reflect on South Africa, which biomes do you think we have? South African Biomes Now that you’ve discovered a bit about world conservation – let’s turn our focus closer to home… http://www.environment.gov.za/enviroinfo/nat/biome.htm 8. What are the 7 biomes that scientists have identified in South Africa? 9. On a separate sheet of paper, design a map of South Africa showing where you would find the various biomes. Page 16 of 64 South African Biomes 10. Analyse your map of the biomes of South Africa and compare it with map of Rainfall in South Africa found on the links: http://www.environment.gov.za/enviroinfo/nat/rain.htm 10. Give a critique of the similarities and differences. 11. How would global warming then affect biomes? Justify your answer. Fynbos Ecology Now check out the website below on Fynbos ecology which is of major importance in South Africa. http://www.wcape.school.za/subject/biology/fynbos/intro.htm 13. How would you identify a Fynbos plant if you were in the field? 14. Give 5 reasons why Fynbos conservation is so vital in South Africa? Page 17 of 64 Fynbos in the Cape http://www.wcape.school.za/subject/biology/fynbos /index.htm 15. Proteas have a symbiotic relationship with sugarbirds, explain the benefits of the relationship to each organism. 16. Fynbos is adapted to withstand fire… explain how? Example 3: Cyberhunt created in PowerPoint. Answers need to be typed in a word processor or on paper. 6. HORIZONTAL AND VERTICAL CYBERHUNTS During my involvement with cyberhunts, I started to notice that two types of cyberhunts can be distinguished in what I have labelled as HORIZONTAL and VERICAL cyberhunts. This refers to the type of cyberhunt or the kind of questioning and exploration of the website visited. A cyberhunt can be defined as horizontal if it complies with the following: The whole cyberhunt (all the questions) is based upon one web page that has been accessed and the learner will be able to find all the answers on that specific web page. The reading thus takes place on one level. The learner is therefore not required to explore the web site deeper by clicking on other hyperlinks within the website. Questions within a cyberhunt can also be horizontal if a learner does not have to explore the visited or accessed website deeper, thus, he/she stays on the same level that has been accessed. Figure 1 tries to visually portray the difference between horizontal and vertical cyberhunts. Horizontal cyberhunts could be the starting point for learners as first time users of the web and their introduction to cyberhunts, as well as to novice teachers starting with ICT integration. These simple and low level cyberhunts assist teachers and learners to feel secure in the initial stages and build ICT confidence in both parties. During this stage learners can start to answer the questions on paper. However, the teacher may decide to move from learners that write answers on paper to learners that open the teacher created cyberhunt file from the network or web and then type their answers either in a blank word processor page or under the composed questions in the teacher created cyberhunt in the answer space provided. Page 18 of 64 A cyberhunt becomes vertical the moment a learner has to explore a website deeper on his/her own to find the answer to the composed question. In practice it entails that a learner is provided with a question and a hyperlink that opens a web page when the hyperlink is selected. However, the learner will not be able to find the answer to the question on that accessed page, but will have to explore the website further by ascertaining whether some of the hyperlinks that can be seen on the accessed web page provide possible clues in their names that indicate that it is a link that can be followed. Alternatively, a learner will have to embark on a step-by-step exploration process of the website to find the answers or by collaborating with a few peers to assist him/her to explore the website to find the appropriate answer. Figure 1 tries to visually portray the difference between horizontal and vertical cyberhunts. These higher level cyberhunts bring Internet exploration or surfing to a higher level and need some more ICT skills and experience related to Internet browsing (surfing). Normally learners will type the answers on their computer and save it and make a print-out. Page 19 of 64 FIGURE 1: HORIZONTAL & VERTICAL READING & BROWSING ON THE WEB DURING CYBERHUNTS5 5 The transparent arrows indicate how the learner/user scrolls up and down, left to right and right to left while reading. The black arrows indicate the movement of learners among the different screens in a website by clicking on the various links or by making use of the forward and back keys in a browser to access/move among previously accessed or visited screens. Page 20 of 64 7. WHERE TO START AND WHERE TO WORK TO? Bloom (1956) has provided us with his taxonomy to assist us to compose questions on different levels of thinking. This taxonomy ranges from lower to higher levels of cognitive thinking and have been defined as (1) knowledge, (2) comprehension, (3) application, (4) analysis, (5) synthesis and (5) evaluation as being the highest level. In 2000, Anderson and Krathwohl6 redefined Bloom’s taxonomy by making certain changes for example rewording Bloom’s nouns to words, rewording certain categories and the repositioning of the last two categories (Wilson, 2005). In addition, Anderson and Krathwohl indicates “how the taxonomy intersects and acts upon different types and levels of knowledge - factual, conceptual, procedural and metacognitive” (Wilson, 2005:IS-2). A detailed description of how Bloom and Anderson and Krathwohl correlate and differentiate can be seen in Table 2 (Wilson, 2005). Anderson is one of Bloom’s former students and Kratwohl is one of Bloom’s original partners who worked with him on the cognition project (Wilson, 2005). 6 Page 21 of 64 Bloom’s Taxonomy 1956 Anderson and Krathwohl’s Taxonomy 2000 1. Knowledge: Remembering or retrieving previously learned material. Examples of verbs that relate to this function are: know identify relate list define recall memorize repeat record name recognize acquire 2. Comprehension: The ability to grasp or construct meaning from material. Examples of verbs that relate to this function are: restate locate report recognize explain express identify discuss describe discuss review infer illustrate interpret draw represent differentiate conclude 3. Application: The ability to use learned material, or to implement material in new and concrete situations. Examples of verbs that relate to this function are: apply relate develop translate use operate organize employ restructure interpret demonstrate illustrate differentiate contrast investigate detect survey classify deduce experiment scrutinize discover inspect dissect discriminate separate 5. Synthesis: The ability to put parts together to form a coherent or unique new whole. Examples of verbs that relate to this function are: compose produce design assemble create prepare predict modify tell plan invent formulate collect set up generalize document combine relate propose develop arrange construct organize originate derive write propose argue decide choose rate select estimate 3. Applying: Carrying out or using a procedure through executing, or implementing. Applying related and refers to situations where learned material is used through products like models, presentations, interviews or simulations. validate consider appraise value criticize infer 4. Analyzing: Breaking material or concepts into parts, determining how the parts relate or interrelate to one another or to an overall structure or purpose. Mental actions included in this function are differentiating, organizing, and attributing, as well as being able to distinguish between the components or parts. When one is analyzing he/she can illustrate this mental function by creating spreadsheets, surveys, charts, or diagrams, or graphic representations. 5. Evaluating: Making judgments based on criteria and standards through checking and critiquing. Critiques, recommendations, and reports are some of the products that can be created to demonstrate the processes of evaluation. In the newer taxonomy evaluation comes before creating as it is often a necessary part of the precursory behavior before creating something. 6. Evaluation: The ability to judge, check, and even critique the value of material for a given purpose. Examples of verbs that relate to this function are: judge assess compare evaluate conclude measure deduce 2. Understanding: Constructing meaning from different types of functions be they written or graphic messages activities like interpreting, exemplifying, classifying, summarizing, inferring, comparing, and explaining. practice calculate show exhibit dramatize 4. Analysis: The ability to break down or distinguish the parts of material into its components so that its organizational structure may be better understood. Examples of verbs that relate to this function are: analyze compare probe inquire examine contrast categorize 1. Remembering: Retrieving, recalling, or recognizing knowledge from memory. Remembering is when memory is used to produce definitions, facts, or lists, or recite or retrieve material. Remember this one has now changed places with the last one on the other side. 6. Creating: Putting elements together to form a coherent or functional whole; reorganizing elements into a new pattern or structure through generating, planning, or producing. Creating requires users to put parts together in a new way or synthesize parts into something new and different a new form or product. This process is the most difficult mental function in the new taxonomy. This one used to be #5 in Bloom's known as synthesis. TABLE 2: Taxonomies of the Cognitive Domain, Bloom vs. Anderson/Krathwohl (Wilson, 2005). Page 22 of 64 What I thus propose is that cyberhunt designers, especially if they are new to the web and/or computers, start with horizontal hunts and with the first level of Bloom or Anderson and Krathwohl’s levels for setting questions for their cyberhunts. As they feel more comfortable, they can start to design on a higher level by including various websites and composing questions on higher levels in the taxonomy. However, more experienced web and computer users may start designing on a higher level, keeping in mind their learners’ level of computer skills and cognitive capabilities. Table 3 provides a detailed summary of the different levels of cyberhunts, ranging from level 1 being the lowest and level 6 being our ultimate goal: learners who design their own cyberhunts for their peers in their own class or for peers in other classes, by making use of the different levels of questioning when they compose questions. It is important too keep both levels in mind as uncertainty and inexperience could lead to negative feelings towards ICT and the development of barriers to higher cognitive levels of thinking leading to lower self-efficacy – negative beliefs in their capabilities of performing at a designated level (See Bandura, 1977, 1997 and Schunk, 2004 for more on self-efficacy). Raising self-efficacy should be our aim. According to Bandura (1997) and Schunk (2004), self-efficacy can be provided at four levels, namely (1) successful performance accomplishments or personal mastery (experiencing success in completing a task), (2) vicarious experience (observing people or people/social modeling in practice), (3) verbal or social persuasion (I/we know you can do this!) and (4) emotional arousal (helping people to believe that things causing anxiety or fear do not affect them internally). Therefore it is important to assist teachers towards personal mastery and through social persuasion to experience success as positive experiences could lead to greater adoption of cyberhunts in the future. Therefore, start on a level where you as designer feel comfortable and don’t be afraid to ask for assistance, even if it means that you have to observe those who have experience, in action. Page 23 of 64 LEVEL LEVEL 1 LEVEL 2 LEVEL 3 LEVEL 4 LEVEL 5 LEVEL 6 PROVIDER OR DESIGNER TEACHER TEACHER TEACHER TEACHER TEACHER A LEARNER, PAIR OR GROUP OF LEARNERS ANSWERS Answers to be found on accessed page only. Answers NOT to be found on accessed page. Learners need to explore the website further by vertical browsing without any assistance. Hyperlinks on page provide hints as hyperlink names are suggestive. Answers NOT to be found on accessed page. Learners need to explore the website further by vertical browsing without any assistance. Hyperlinks on page do not provide any hints. Topic, Theme or Problem introduced. Keywords are provided. Topic, Theme or Problem introduced. Keywords are NOT provided. Possible keywords that may match the topic, theme or problem need to be generated by learners. Generate or Design Cyberhunts on any of the levels OR a combination of the levels. DEPTH WHERE ARE THE QUESTIONS FOR THE CYBERHUNT ROLE OF LEARNER Questions with hyperlinks underneath on PC screen. Click on hyperlinks. OR Horizontal OR Questions with hyperlinks underneath on paper (not on PC screen). Learner needs to type hyperlink in search engine’s address bar. Questions with hyperlinks underneath on PC screen. Click on hyperlinks. OR LEVELS OF POSSIBLE QUESTIONING OR Vertical Questions with hyperlinks underneath on paper (not on PC screen). Learner needs to type hyperlink in search engine’s address bar. Questions with hyperlinks underneath on PC screen. Click on hyperlinks. OR Vertical OR Questions with hyperlinks underneath on paper (not on PC screen). Learner needs to type hyperlink in search engine’s address bar. Questions without hyperlinks on PC screen. Learner needs to type provided keywords in search engine’s search box. Select and explore the results. Horizontal and/or Vertical OR OR Questions without hyperlinks on paper. Learner needs to type provided keywords in search engine’s search box. Select and explore the results. Questions without hyperlinks on PC screen. Learner needs to type own generated keywords in search engine’s search box. Select and explore the results. Horizontal and/or Vertical OR OR Questions without hyperlinks on paper. Learner needs to type own generated keywords in search engine’s search box. Select and explore the results. Learners design questions with OR without hyperlinks on PC screen. Click on hyperlinks OR Learner needs to type hyperlink in search engine’s address bar OR Learner needs to type provided keywords or own generated keywords in search engine’s search box. Select and explore the results. OR OR Learners design questions with OR without hyperlinks on paper. Learner needs to type hyperlink in search engine’s address bar OR Learner needs to type provided keywords or own generated keywords in search engine’s search box. Select and explore the results. Horizontal and/or Vertical Table 3: Different levels of cyberhunts Page 24 of 64 Remembering Understanding Applying Analyzing Evaluating Creating These levels can be utilized by starting with the REMEMBERING level and gradually moving to the higher levels 8. STEPS FOR CREATING A CYBER HUNT The following steps are merely suggestions and are not prescriptive. Feel free to add or delete where you feel it is appropriate. A. SELECT A TOPIC OR THEME 1. Select a Learning Area and decide on a topic or theme that can be linked to the National Curriculum Statement (RNCS or NCS). This can be done in consultation with your learners, as learner input might lead to greater motivation and a feeling of ownership among learners. B. COMPUTER WORK 2. Generate keywords or phrases that could be linked to the topic. (This can be done with the assistance of your learners during Step 1). 3. Open Microsoft Word or your preferred word processor. Here you are going to type your questions related to the topic as well as the web address (URL) of the website to which this question refers. (This will obviously depend on the level of the cyberhunt that you want to create). 4. Open Internet Explorer (Your Web Browser) 5. Decide on the search engine that you want to use for example www.google.com or www.askjeeves.com, etc. Type in the search engine’s address toolbar box the URL for example www.google.com 6. When your search engine appears in the Web Browser, type the generated keywords or phrases into the search box of your search engine. Remember that you can still generate keywords or phrases as you are searching. Write them down on paper. 7. Explore the generated results produced by your search engine. 8. Copy the web address by highlighting it in the Web Browser’s address toolbar and then selecting copy from the edit menu (CTRL-C is the shortcut). Remember to bookmark sites, or to write the web addresses down. Bookmarking websites (Favorites button and Add to Favourites in your web browser) allow you to refer or revisit a previously visited web site with ease by selecting the web site from the Favourites option in your web browser. 9. If your word processor is open, switch to it by pressing the ALT-TAB keys. Press the ALT key first, keep it down and press the TAB key. While keeping the ALT key pressed, press the TAB key to move to the programme you want to be opened. Should your word processor be not open, open it by clicking on the START button and then select your word processor. Remember the ALT TAB function to move among opened programmes. Page 25 of 64 C. QUESTION WORKSHEET GENERATION 10. Decide what kind of question you do want to ask. Normally one starts with simple or straightforward types of questions and then move to a higher level of questioning. Refer to the different levels of questioning as suggested in Table 2. Type the question related to your topic. 11. Copy your selected URL (the web address) underneath your typed question by selecting the Edit menu and the Copy option from the dropdown menu box. Alternatively you could use the shortcut option by pressing CTRL-V (Keep in mind that this will only work if you have highlighted the text to be copied previously. See Step 8). 12. Should you want to compose more questions pertaining to the open website, type these questions and paste the URL or indicate to your learners that they have to visit the same website to answer the questions. 13. Should you want to explore the open website deeper (vertically), and then do so. Depending on the level of the cyberhunt that you want to design, you will then have to decide whether you will provide the new URL to your learners or whether they will have to explore the website deeper (vertically). If you decide to provide the web address, then copy and paste it as indicated previously. (Note: You do not have to use the address as the link. Instead you can use the question and use the question as a hyperlink. The disadvantage is that learners do not see the way in which a web address is structured. However, this could be useful, especially with young learners.) 14. If you have decided that you want to compose more questions, you could press the BACK button/option on your web browser to take you back to the previous screen in your web browser. Keep on selecting the BACK button until you are where you want to be. For example, if you want to return to the search engine in your web browser where you started initially, keep clicking on the BACK button until that screen appears. You could also start afresh by selecting and opening your web browser. Then follow the sequence as indicated by Step 5 and further. 15. To make your cyberhunt more attractive, you could insert applicable pictures that will enhance your topic. Do not insert pictures merely for the sake of having pictures. 16. HINT: You could create tables with two columns and several rows in which you provide space for your learners to type their answers on the computer (PC). In this way learners also learn how to move with the cursor keys and the mouse to the different sections on your page. This can then be printed. Alternatively, you could make a print-out of the questions and the learners can then write the answers in the provided space. Page 26 of 64 How many elephants are there in the Addo Elephant Park? (Remembering) 1. http://www.nature-reserve.co.za/cape-eastern-addo-elephant-park.html ANSWER What is another name for a suricate? Describe one in a sentence 2. (Comprehension) http://www.nature-reserve.co.za/cape-eastern-addo-elephant-park.html ANSWER 17. Memo: Remember to set up a memo while you are busy. Type the answers below the questions and print the memo. SAVE the memo and questions. Remember to DELETE the answers before you make another print out for your learners to work on. Should you want to save your cyberhunt in order that your learners can complete it on the computer, the answers have also to be deleted. (Save the questions for example as CyberhuntAddo1 and the memo as CyberhuntAddo1Memo). 18. If your learners are going to type the answers on the computer, remember to save the Cyberhunt on the server where they all can gain access to the specific file. Learners must be informed that they need to SAVE their answers regularly while they are busy working on the Cyberhunt. 19. Be sure to save your page on your home drive after every question. 20. Add a title and directions to your Cyber Hunt. They may be in different sizes, fonts, etc. 21. Upload the page onto the web or web server or save the page on your network server. 9. CONCLUSION Cyberhunts could be one of the tools that could assist us to tackle the reading and comprehension deficiencies that our South African learners experience. Furthermore, the design of cyberhunts by teachers could lead to greater integration of the curriculum and classroom based experience by making use of the computer and the Internet. Cyberhunt design could also lead to greater participation among teachers to design cyberhunts on different aspects in the various Learning Areas. This could lead further to the establishment of a South African online website that contains cyberhunts grouped by grades and learning areas which teachers can download or access online. If a teacher wants to use a specific cyberhunt on the South African online website in his/her classroom, the learners could Page 27 of 64 simply type the web address in their web browser and start with the cyberhunt. Should teachers want to add additional activities, he/she is also welcome do to so. Therefore I want to urge all of us attending this workshop on cyberhunts, to become involved in the creation of this tool and to spread the word of its capabilities and the ease of its design. REFERENCES Bandura, A., (1977). Social Learning Theory. Englewood Cliffs, NJ: Prentice Hall. Bandura, A. (1997). Self-efficacy: The Exercise of Control. New York: Freeman. Bloom, B.S. (Ed.) (1956) Taxonomy of educational objectives: The classification of educational goals: Handbook I, Cognitive Domain. New York: Longmans, Green. Department of Education [DOE] (1997a). Curriculum 2005: Lifelong Learning for the 21st Century - A User's Guide. Available: http://www.polity.org.za/govdocs/misc/curr2005.html [Accessed: 31 March 2002] Department of Education [DOE] (1997b). Department of Education: Intermediate Phase (Grade 4 to 6) Policy Document. Pretoria. Department of Education [DOE] (2003). Transforming Learning and Teaching through Information and Communication Technologies. (Draft White paper on e-Education of September 2003). Dodge, B. (1997). Some Thoughts About Webquests. Available: http://webquest.sdsu.edu/about_webquests.html [Accessed: 18 June 2007]. Du Plessis, A. (2003). Learners Perceptions of Creating a Collaborative Hypermedia Product: AN Exploratory Study at Mount Pleasant Primary School. Unpublished Med Thesis, Rhodes University: South Africa. Dochy, F. (2001). A New Assessment Era: Different needs, new challenges. Research Dialogue in Learning and Instruction 2 (2001) 11-20. Eriksen, T.H. (2001). Tyranny of the Moment: Fast and Slow Time in the Information Age. London: Pluto Press. Fosnot, C. (ed.) (2005). Constructivism: Theory, Perspectives and Practice. New York: Teachers College Press. Gagnon, G.W. and Collay, M. (2001). Constructivist Learning Design. Thousand Oaks, California: Corwin Press. Gagnon, G.W. and Collay, M. (2006). Constructivist Learning Design: Key Questions for Teaching to Standards. Thousand Oaks, California: Corwin Press. Healy, J. M. (1990). Endangered minds: Why our children don’t think. New York: Simon and Schuster. Hinchey, P. (1998). Finding freedom in the classroom: A practical introduction to critical theory. New York: Peter Lang. Page 28 of 64 Jonassen, D.H., Howland, J., Moore, J. and Marra, R.M. (2003). Learning to Solve Problems with Technology: A Constructivist Perspective. New Jersey: Merrill, Prentice Hall. Jonassen, D.H., Peck, K.L. and Wilson, B.G. (1999). Learning with Technology: A Constructivist Perspective. New Jersey: Merrill, Prentice Hall. Keller, J.B. and Reigeluth, C.M. (2004). Revolutionizing School Reform for Educational Transformation, Educational Technology, XLIV(5), 17-23. Le Cordeur, M. (2005). Terug na die ABC van lees. Rapport, 25 September 2005. Perspektief, bl. 2. Moll, I. (2002). Clarifying Constructivism in a context of Curriculum change. Journal of Education. No 27, February 2002, pp. 1-32. http://www.edu.unp.ac.za/joe/joe_issues.htm or http://www.edu.unp.ac.za/joe/joepdfs/joe%2027%20moll.pdf [2002, July, 07]. Nations, C. (2001). How Long Do Our Children Have to Wait?: Understanding the Children of the 21st Century, the Need for Pedagogical Change, and Technology Integration. Available: http://pt3.nmsu.edu/educ621/cynthia2.html [Accessed: 05 April 2002] Perkins, D. N. (1986). Knowledge as Design. Hillsdale, NJ: Erlbaum. Perkins, D. N. (1991). Technology meets constructivism: Do they make a marriage? Educational Technology, 31(5), 18-23. Perkins, D. (1992). Smart schools. New York: The Free Press. Perkins, D. (1996). Mind in the hood. In B.G. Wilson (Ed.). Constructivist learning environments: Case studies in instructional design. (pp. v-viii). Englewood Cliffs, NJ: Educational Technology Publications. Rechtfertig, M.A. (2002). Internet CyberHunts. Dixie School District Staff Development Day, January 16, 2002, 1:45 pm - 3:30pm. Presenter: Mary Ann Rechtfertig. Available: http://dixiesd.marin.k12.ca.us/dixieschool/Classrooms/Rechfertig/cyberhunts/ [Accessed: 18 June 2007] Retief, H., (2003). Hlp, ma, ek kn ni lees nie. Rapport. 29 Junie 2003. Schunk, D.H. (2004). Learning Theories: An educational perspective (4th ed.). Upper Saddle River, NJ: Merrill/Prentice Hall. Schweizer, H. and Kussow, B. (2007). WebQuests: Tools for Differentiation. Gifted Child Today, 30, (29-35). Slayden, B. (2000). Scavenger Hunt for Knowledge. Available: http://www.suite101.com/article.cfm/english_education_k12/33709 [Accessed: 18 June 2007]. Starr L. (1999). Scavenger Hunts: Searching for Treasure on the Internet! Educational World. Available: http://www.education-world.com/a_curr/curr113.shtml [Accessed: 18 June 2007]. Van Harmelen, U. (1995). Behaviourism, empiricism and education. In Higgs, P. Metatheories in Philosophy of education. (pp. 51-67) Johannesburg: Heinemann. Wilson, L. (2005). Beyond Bloom - A new Version of the Cognitive Taxonomy. Available: http://www.uwsp.edu/education/lwilson/curric/newtaxonomy.htm [Accessed: 15 June 2007]. Page 29 of 64 OUTCOMES OF CYBERHUNT WORKSHOP Page 30 of 64 CYBERHUNTS OR SCAVENGER HUNTS: THEORY, DISCUSSION & PRACTICAL By André du Plessis Nelson Mandela Metropolitan University 2007 OUTCOMES At the end of this session you should be able to: Identify Bloom’s Taxonomy and name the different categories Provide examples of the keywords related to each of the categories Identify the difference between convergent and divergent questions Relate convergent and divergent questions to Bloom’s Taxonomy Explain what a Cyberhunt is Explain the difference between horizontal and vertical Cyberhunts Define the critical attributes or components of a Cyber Hunt Identify what thinking skills are involved in a Cyberhunt Explain what is meant under each thinking skill Name the Design Steps of a Cyberhunt and explain each step Name and discuss the Pedagogical principles which underpin Cyberhunts Search for websites about Cyber Hunts on the Internet: On finding websites, students should then examine the Cyberhunt with a view to obtain greater understanding of this lesson type. Design your own Cyberhunt Activity (Lesson) using FrontPage, PowerPoint or Word in a Web-Based online context Discuss the advantages and disadvantages of a Web-Based online Cyberhunt Design your own Cyberhunt Activity (Lesson) using FrontPage, PowerPoint or Word in an off-line non-Web-Based context Discuss the advantages and disadvantages of an off-line non-Web-Based Cyberhunt SOURCES INT 1 Internet: Visit sites and explore Search for cyberhunts, cyber hunts or scavenger hunts on www.google.com Possible websites [Accessed: 18 June 2007] http://www.woodlands-junior.kent.sch.uk/cyberhunts/Index.html http://www.spa3.k12.sc.us/Scavenger.html http://webtech.kennesaw.edu/jcheek3/shunts.htm http://www.oswego.org/staff/cchamber/webdesign/scavenger.htm http://homepage.mac.com/cohora/ext/internethunts.html Page 31 of 64 INT LECTURE & DISCUSSION Introduction and organization of class Practical experience: web browsing and off-line browsing of Cyberhunts (If problematic, an alternative will be in place) Class discussion: Advantages and disadvantages of On-Line Cyberhunts Class discussion: Advantages and disadvantages of Off-Line Cyberhunts Presentation: Theory behind Cyberhunts Practical Presentation: How to create a Cyberhunt in Word Practical assignment in groups: Create Cyberhunt in groups Designing Lesson on your own: o Create own on-line Cyberhunt (Half of the class) while other half of the class find info/data and prepare questions for an off-line Cyberhunt to be created in Word, PowerPoint or FrontPage ASSIGNMENTS FOLLOW ASSIGNMENT 1: CYBERHUNT LESSON (ON-LINE) Name and Surname: Student number: ASSIGNMENT 1 Design your own Cyberhunt Activity (Lesson) using FrontPage, PowerPoint or Word Hand it in on disk OR your lecturer will evaluate you while in class. Remember that it must be web based (On-Line based) Obtain ideas by searching on the Internet in for example www.google.com for the term cyber hunt or cyberhunt or scavenger hunt. Use these examples that you find as a starting point to generate ideas. Your Cyberhunt must contain 15-20 questions. Indicate Bloom’s Category next to each question. Your learners need to find the answers to these questions on websites on the Internet. You have to use at least 3 websites on which you base your questions. Obviously you are more creative if you use more than one website. The key is that all the questions should cover the same theme or topic. Remember to indicate next to each question its relation to the Bloom taxonomy. Supply a memo too. Page 32 of 64 Criteria Web links under each question for learners to explore Questions related to a theme Creativity of page Memo Max mark 8 15 5 Excellent Adequate Developing Most of the web links are working (leads to website on which answers to questions can be found) Some of the web links are working (leads to website on which answers to questions can be found). Needs some work. Web links need work. Only a few of the links work (leads to website on which answers to questions can be found) 7-8 marks 4-6 marks 1-3 marks 15-20 questions. Well formulated. Focus on higher order thinking skills: Knowledge, comprehension, application, analyses (See Bloom). Focus on one theme or topic. 10-14 questions. Focus on knowledge and comprehension only. Focus on one theme or topic. 10 or less questions. Not very clear. Does not focus on one theme or topic. 11-15 marks 8-10 marks 1-7 marks Very inviting to learners. Spacing is excellent and colours used with great effect. Pictures have been inserted that match the theme or topic and are well positioned. Creativity evident. Spacing and colours on web page are enticing. Need more attention towards creativity. Spacing and colour not enticing. 4-5 marks 3 marks 1-2 marks Memo included Memo partially completed (more than 70%) No Memo 2 marks 1 marks 0 marks 2 TOTAL: 30 Page 33 of 64 Inadequate Not handed in 0 marks Not handed in 0 marks Not handed in 0 marks HOW TO MAKE HYPERLINKS IN WORD Page 34 of 64 WORD HUNTS & CYBERHUNTS: MAKING LINKS WORD HUNTS: Based on text documents that you have saved in WORD You do not have to be on the Internet CYBERHUNTS: Based on documents or websites that is on the Internet You have to be connected to the Internet OR you have to save the Internet Website and then follow the same procedure as a WORD HUNT. Points to remember: Create a FOLDER for every new WordHunt Name the FOLDER in such a way, that you will know what the WordHunt is about Save your pages related to your WordHunt in the FOLDER. Draw blocks on paper (our use this template below) to indicate what you are going to call each page. Save each Reading Piece in that folder with a name that you can relate to. HomepageWordHunt Page with Questions & Answer spaces The flying kites Reading Piece How roads are made Reading Piece HOW TO MAKE THE LINKS: 1. 2. 3. 4. Go the position/place where you want to insert the hyperlink. Click the INSERT toolbar Select HYPERLINK from the drop down toolbar The following box appears (See next page) Page 35 of 64 SirWalterRaleigh Reading Piece 5. Select your FOLDER in which you have saved the Reading Piece. (Click on the Look in: box arrow). 6. 7. 8. Click on the FILENAME that you want to make the hyperlink to be linked to. Click on the OK button. The hyperlink will appear in your document. NB: You have to make hyperlinks in this manner if you make your own WORDHUNTS: From the Question Page (saved as a WORD file) to the Reading Pieces (saved as a WORD files) From the Reading Pieces (saved WORD files) the Question Page (save WORD file) To test or use a hyperlink: Move the mouse pointer to the hyperlink and press the CTRL key down. The page that the hyperlink is linked to, will open. Three options for the answer sheet: Learners can either type the answers in WORD in the spaces that you have provided OR Learners can type it in a NEW WORD document, SAVE it and PRINT it OR You can PRINT the Questions and Answers sheet and they write on it with pen or pencil. Page 36 of 64 STEPS TO BE FOLLOWED FOR CYBERHUNT DESIGN Page 37 of 64 STEPS FOR CREATING A CYBERHUNT The following steps are merely suggestions and are not prescriptive. Feel free to add or delete where you feel it is appropriate. A. SELECT A TOPIC OR THEME 1. Select a Learning Area and decide on a topic or theme that can be linked to the National Curriculum Statement (RNCS or NCS). This can be done in consultation with your learners, as learner input might lead to greater motivation and a feeling of ownership among learners. B. COMPUTER WORK 2. Generate keywords or phrases that could be linked to the topic. (This can be done with the assistance of your learners during Step 1). 3. Open Microsoft Word or your preferred word processor. Here you are going to type your questions related to the topic as well as the web address (URL) of the website to which this question refers. (This will obviously depend on the level of the cyberhunt that you want to create). 4. Open Internet Explorer (Your Web Browser) 5. Decide on the search engine that you want to use for example www.google.com or www.askjeeves.com, etc. Type in the search engine’s address toolbar box the URL for example www.google.com 6. When your search engine appears in the Web Browser, type the generated keywords or phrases into the search box of your search engine. Remember that you can still generate keywords or phrases as you are searching. Write them down on paper. 7. Explore the generated results produced by your search engine. 8. Copy the web address by highlighting it in the Web Browser’s address toolbar and then selecting copy from the edit menu (CTRL-C is the shortcut). Remember to bookmark sites, or to write the web addresses down. Bookmarking websites (Favorites button and Add to Favourites in your web browser) allow you to refer or revisit a previously visited web site with ease by selecting the web site from the Favourites option in your web browser. 9. If your word processor is open, switch to it by pressing the ALT-TAB keys. Press the ALT key first, keep it down and press the TAB key. While keeping the ALT key pressed, press the TAB key to move to the programme you want to be opened. Should your word processor be not open, open it by clicking on the START button and then select your word processor. Remember the ALT TAB function to move among opened programmes. Page 38 of 64 C. QUESTION WORKSHEET GENERATION 10. Decide what kind of question you do want to ask. Normally one starts with simple or straightforward types of questions and then move to a higher level of questioning. Refer to the different levels of questioning as suggested in Table 2. Type the question related to your topic. 11. Copy your selected URL (the web address) underneath your typed question by selecting the Edit menu and the Copy option from the dropdown menu box. Alternatively you could use the shortcut option by pressing CTRL-V (Keep in mind that this will only work if you have highlighted the text to be copied previously. See Step 8). 12. Should you want to compose more questions pertaining to the open website, type these questions and paste the URL or indicate to your learners that they have to visit the same website to answer the questions. 13. Should you want to explore the open website deeper (vertically), and then do so. Depending on the level of the cyberhunt that you want to design, you will then have to decide whether you will provide the new URL to your learners or whether they will have to explore the website deeper (vertically). If you decide to provide the web address, then copy and paste it as indicated previously. (Note: You do not have to use the address as the link. Instead you can use the question and use the question as a hyperlink. The disadvantage is that learners do not see the way in which a web address is structured. However, this could be useful, especially with young learners.) 14. If you have decided that you want to compose more questions, you could press the BACK button/option on your web browser to take you back to the previous screen in your web browser. Keep on selecting the BACK button until you are where you want to be. For example, if you want to return to the search engine in your web browser where you started initially, keep clicking on the BACK button until that screen appears. You could also start afresh by selecting and opening your web browser. Then follow the sequence as indicated by Step 5 and further. 15. To make your cyberhunt more attractive, you could insert applicable pictures that will enhance your topic. Do not insert pictures merely for the sake of having pictures. 16. HINT: You could create tables with two columns and several rows in which you provide space for your learners to type their answers on the computer (PC). In this way learners also learn how to move with the cursor keys and the mouse to the different sections on your page. This can then be printed. Alternatively, you could make a print-out of the questions and the learners can then write the answers in the provided space. Page 39 of 64 How many elephants are there in the Addo Elephant Park? 1. (Remembering) http://www.nature-reserve.co.za/cape-eastern-addo-elephant-park.html ANSWER What is another name for a suricate? Describe one in a sentence 2. (Comprehension) http://www.nature-reserve.co.za/cape-eastern-addo-elephant-park.html ANSWER 17. Memo: Remember to set up a memo while you are busy. Type the answers below the questions and print the memo. SAVE the memo and questions. Remember to DELETE the answers before you make another print out for your learners to work on. Should you want to save your cyberhunt in order that your learners can complete it on the computer, the answers have also to be deleted. (Save the questions for example as CyberhuntAddo1 and the memo as CyberhuntAddo1Memo). 18. If your learners are going to type the answers on the computer, remember to save the Cyberhunt on the server where they all can gain access to the specific file. Learners must be informed that they need to SAVE their answers regularly while they are busy working on the Cyberhunt. 19. Be sure to save your page on your home drive after every question. 20. Add a title and directions to your Cyber Hunt. They may be in different sizes, fonts, etc. 21. Upload the page onto the web or web server or save the page on your network server. Page 40 of 64 EXAMPLES OF CYBERHUNTS (CREATED BY NMMU STUDENTS) Page 41 of 64 BY JASMIN HACK Instructions 7 Fill in your name and student number You will find several questions that are related to various websites. To answer each question you will need to click on the blue highlighted web address which will take you to the website that will offer the information needed to answer the question. Answer all questions on the page. Once you have completed your work, save it under your name and surname in the folder named VolcanoesGrade6A. Name and Surname Grade Date Question 1 (Comprehension) What would you do if a volcano erupts? http://vulcan.wr.usgs.gov/Hazards/Safety/what_to_do.html Answer Question 2 (Knowledge) List all the Volcanoes in Tanzania. http://volcano.und.edu/vwdocs/volc_images/africa/africa.html Answer Question 3 (Knowledge/ Anaylis By looking at the map and information related to the dispersal of volcanoes, identify the area which is most dense. Roughly how many volcanoes would you say there are? http://www.geo.mtu.edu/volcanoes/world.html Answer Question 4 (Evaluation) Read the differences between shield and strato volcanoes and explain the differences between each volcano. http://volcano.und.edu/vwdocs/vwlessons/volcano_types/index.html Answer Question 5 (Synthesis) Explain a Volcanologist’s occupation. http://volcano.und.edu/vwdocs/how_to.html Answer 7 This example of a cyberhunt has been created by a students in 2006 at the NMMU for the PEC203 module. Page 42 of 64 Question 6 (Application) What are ophiolites? http://volcano.und.edu/vwdocs/vw_hyperexchange/ophiolites.html Answer Question 7 (Evaluation) Compare and contrast the largest eruptions in 10,000 years in Europe with that of South America. http://volcano.und.edu/vwdocs/vw_hyperexchange/veiTables/s_america.html Answer Question 8 (Knowledge) How many times has Mount St Helens erupted in the past 10, 000 years? http://volcano.und.edu/vwdocs/vw_hyperexchange/veiTables/usa.html Answer Question 9 (Synthesis) Identify the various parts of a volcano. http://volcano.und.edu/vwdocs/vw_hyperexchange/parts.html Answer Question 10 (Analysis) Give examples of colossal, super-colossal and mega-colossal volcanoes. http://volcano.und.edu/vwdocs/eruption_scale.html Answer Question 11 (Knowledge) How often do explosive volcanoes erupt? http://volcano.und.edu/vwdocs/eruption_scale.html Answer Question 12 (Evaluation) Compare the differences between a cow-pie bomb and a bread crust bomb. http://www.gc.maricopa.edu/earthsci/imagearchive/bombs.htm Answer Question 13 (Analysis) List the ten deadliest eruptions. http://volcano.und.edu/vwdocs/vw_hyperexchange/deadly_volcs.html Answer Question 14 (Analysis) Identify the different sectors that are affected in volcanic eruptions. What are is most affected? http://volcano.und.edu/vwdocs/vw_hyperexchange/CostVolc.html Answer Question 15 (Application) Show how the various gases involved in volcanic eruptions can affect our lives. http://volcano.und.edu/vwdocs/Gases/man.html Answer Page 43 of 64 A VISIT TO ADDO ELEPHANT PARK8 Answer the questions on your printed worksheets. Click on the blue links to go to a website which has the information you need to answer the questions listed below it. What to see and do in Addo http://www.nature-reserve.co.za/cape-eastern-addo-elephant-park.html 7. (Know) How many elephants are there in the Addo Elephant Park? 8. (Know) How far away from Port Elizabeth is the Addo Elephant Park? 9. (Know) Name three other kinds of large animals you could expect to see in Addo. 10. (Comp) What is another name for a suricate? Describe one in a sentence. 11. (Comp) What activities are do you think is the main thing visitors to Addo do? (i.e. what is the most popular activity) 12. (Comp) What other activities are there? (Name at least 3). Accommodation at Addo http://www.sanparks.org/parks/addo/ 13. (Know) What are the main kinds of different accommodation are there at Addo? Name at least five kinds. 14. (Appl) How many safari tents available for the night of the 1 September 2006? 15. (Know) How many people can sleep in each tent? 16. (Comp) Describe a safari tent in your own words (Hint: find some pictures). 17. (Appl) How much would it cost for a family of 2 adults and 2 children to share a Forest Cabin on the night of 1 September 2006? 18. (Comp) Which number would you phone to book your reservation? Getting there http://www.sanparks.org/parks/addo/ 15. (Anal) If you were going to drive to Addo from Port Elizabeth, which route would you take? (Give the route numbers of the major roads you would take). 16. (Appl) How long do you think it would take to get there? Justify your answer. Other game parks http://www.shamwari.com 18. (Appl) Someone has told you that Shamari is a very good game park. How much would it cost for two people to spend one night in the Long Lee Manor lodge on 1 September 2006? 19. (Eval) What sort of tourists do you think Shamwari is trying to attract? Give a reason for your answer. 20. (Synth) Plan a trip to Addo for a family of 2 adults and 2 children. Specify your itinerary and budget (what time would you leave, what would you do when you were there, where would you stay, how much money would you need for the trip). 8 This example of a cyberhunt has been created by a students in 2006 at the NMMU for the PEC203 module. Page 44 of 64 POWERPOINT BASED CYBERHUNT9 ECOLOGY Grade 9 Let’s discover the world in which we live! Introduction to Ecology Check out the website Kids Do Ecology and its related links and after exploring, answer the questions that follow… http://www.nceas.ucsb.edu/nceasweb/kids/ecology/index.html • • • 9 Define the term ecology. Name three jobs you could do after becoming an Ecologist Why is Ecology important? This example of a cyberhunt has been created by a students in 2006 at the NMMU for the PEC203 module. Page 45 of 64 Biomes http://www.nceas.ucsb.edu/nceasweb/kids/biomes/what_biomes_are.htm 4. Explain what a biome is in your own words. 5. The biomes are separated into two general classifications. Name them 6. List the 12 Biomes of the World 7. Reflect on South Africa, which biomes do you think we have? South African Biomes Now that you’ve discovered a bit about world conservation – let’s turn our focus closer to home… http://www.environment.gov.za/enviroinfo/nat/biome.htm 8. What are the 7 biomes that scientists have identified in South Africa? 9. On a separate sheet of paper, design a map of South Africa showing where you would find the various biomes. Page 46 of 64 South African Biomes 10. Analyse your map of the biomes of South Africa and compare it with map of Rainfall in South Africa found on the links: http://www.environment.gov.za/enviroinfo/nat/rain.htm 10. Give a critique of the similarities and differences. 11. How would global warming then affect biomes? Justify your answer. Fynbos Ecology Now check out the website below on Fynbos ecology which is of major importance in South Africa. http://www.wcape.school.za/subject/biology/fynbos/intro.htm 13. How would you identify a Fynbos plant if you were in the field? 14. Give 5 reasons why Fynbos conservation is so vital in South Africa? Page 47 of 64 Fynbos in the Cape http://www.wcape.school.za/subject/biology/fynbos /index.htm 15. Proteas have a symbiotic relationship with sugarbirds, explain the benefits of the relationship to each organism. 16. Fynbos is adapted to withstand fire… explain how? Page 48 of 64 POWERPOINT PRESENTATION ON CYBERHUNTS Page 49 of 64 SESSION CYBERHUNTS OR SCAVENGER HUNTS SCHOOLNET CONFERENCE BLOEMFONTEIN SOUTH AFRICA 2007 By André du Plessis INTRODUCTION: SOME GENERAL INTERNET SURF SAFETY ISSUES Cyber Patrol Net Nanny Neth Shepherd Safesurf Surfwatch WHY? Blocks access or accidental access to many harmful websites BEWARE: These software packages provide only limited protection. Problems (visiting inappropriate websites) could still be possible Page 50 of 64 PAPER CUP SYSTEM Paper cup marker system: How does this work and why successful? KEEPING LEARNERS ON TASK Present learners with interesting tasks or problems Use collaborative groups Involve learners in decision making Visit groups to gather (see) whether they understand what is required (provide assistance when needed) Make general announcement ONLY if several learners or groups experience the same problem Involve learners in establishing class rules Page 51 of 64 CYBERHUNTS … Will CYBERHUNTS keep learners on task? WHAT IS A CYBERHUNT? Scavenger Hunts are a tool for teaching your students how to search for information while using the Internet and provide an interesting format for instruction. Page 52 of 64 WHAT OTHER BENEFITS? Tool for improving comprehension (How?) Tool for practicing reading: Reading on screen different from a book (WHY?) Tool for question construction: learners can construct questions on a topic from the web or Encarta Multimedia Encyclopedia (How does assist learning?) CYBERHUNTS BASED UPON INTERNET (WWW) DISCUSS IN GROUPS AND PROVIDE FEEDBACK – What are the ADVANTAGES? – What are the DISADVANTAGES? Page 53 of 64 CYBERHUNTS BASED UPON ENCARTA OR YOUR OWN CREATIONS IN WORD / POWERPOINT / FRONTPAGE DISCUSS IN GROUPS AND PROVIDE FEEDBACK – What are the ADVANTAGES? – What are the DISADVANTAGES? TYPES OF QUESTIONS: BLOOM’S TAXONOMY WHAT IS MEANT BY THIS? WHAT IS MEANT BY: – Convergent questions? – Divergent questions? Page 54 of 64 BLOOM’s TAXONOMY Level 1 to 6 Knowledge Comprehension Application Analysis Synthesis Evaluation BLOOM: Examples of keywords KNOWLEDGE: Recall of data • • • • • • • • • • • define describe identify label list match name Outline Recalls Select state Page 55 of 64 BLOOM: Examples of keywords Comprehension: Understand the meaning, translation, interpolation, and interpretation of instructions and problems. State a problem in one's own words. • convert • • • • • • • defend • distinguish • estimates • explain • extend • gives examples interpret Paraphrase predicts rewrite summarize translate BLOOM: Examples of keywords Application: Use a concept in a new situation or unprompted use of an abstraction. Applies what was learned in the classroom into novel situations in the workplace. • apply • relate • change • Compute / calculate • construct • show • solve • uses • demonstrate Page 56 of 64 BLOOM: Examples of keywords Analysis: Separates material or concepts into component parts so that its organizational structure may be understood. Distinguishes between facts and inferences. • analyze • break down • compare • contrast • diagram • • • • • identify illustrate outline select separate • differentiate • discriminate • distinguish BLOOM: Examples of keywords Synthesis: Builds a structure or pattern from diverse elements. Put parts together to form a whole, with emphasis on creating a new meaning or structure. • organize • categorize • plan • combine • rearrange • compile • reconstruct • compose • reorganize • create • revise • devise • rewrite • design • summarize • explain • generate • modify Page 57 of 64 BLOOM: Examples of keywords Evaluation: Make judgments about the value of ideas or materials. • • • • • • • • appraise compare conclude contrast criticize critique defend describe • • • • • evaluate explains interpret justify relate PEDAGOGICAL PRINCIPLES / RATIONALE Scavenger Hunts can be used in every curriculum area and grade level. Scavenger Hunts provide students with technology skills and subject matter knowledge. Scavenger Hunts can be used as the introductory or culminating activity for a unit of study. Scavenger Hunts may also be the unit of study itself, making the students more active learners. Scavenger Hunts are easy to create. Page 58 of 64 DEPTH OF CYBERHUNTS Horizontal ???? Vertical ???? WHAT THINKING SKILLS INVOLVED? Explain Knowledge: Recall (Not really a thinking skill – very limited WHY?) Comprehension Application Decision making Comparing Classifying Analyzing errors in one’ one’s own thinking Internalization & knowledge building Analyzing Synthesizing Evaluation Page 59 of 64 TYPES OF CYBERHUNTS Based on ONE website only (URL provided) (Example) – One page based: Learners explore only one page on a website. All answers can be found on this page (horizontal) – Several pages based on one website: Learners explore the website and navigate through it to find the answers on different pages within the website to the questions posed (vertical) Based on several websites (URL provided) – Several websites have to be visited to answer the questions (First page based or several pages based) [Horizontal OR Vertical] TYPES OF HAND OUTS Type questions in MS WORD with hyperlinks below each question. Hand out Printed Sheet. Learners type the hyperlinks in the Browser Type questions in MS WORD with hyperlinks below each question. Learners open MS Word and click on hyperlink (use computer). Learners answer questions on screen OR by writing it on a piece of paper Page 60 of 64 COMPONENTS OF A CYBER HUNT (1) Introduction OR Task is given: – Usually to search for information on a topic Hand out – with questions and hyperlinks (URL’ (URL’s) OR – Computer Based page with hyperlinks (URL’ (URL’s) saved by teacher and opened by learners on the computer COMPONENTS OF A CYBERHUNT (2) Describe to learners how to use Browser & Search engine: – Typing in URL’ URL’s and/or – Browser commands – How to search for information Learner visit or search for sites Answer questions Feedback & Assessment – Teacher, Self, Peer or Class based Page 61 of 64 DESIGNING A CYBERHUNT: HOW? (1) Choose topic Search for sites related to topic to be visited by students – Remember to bookmark sites or to open multiple windows. (WHY?) Open FrontPage OR Word or PowerPoint. – Choose Colours and Backgrounds from – Also choose your font and size DESIGNING A CYBERHUNT: HOW? (2) From each site, write one or more questions for students to answer. Type the questions in FrontPage / Word or PowerPoint Return to the web site where the answer can be found. Copy the entire address from the line at top of the page to FrontPage/Word/ PowerPoint Page 62 of 64 DESIGNING A CYBERHUNT: HOW? (3) Back in FrontPage / Word / PowerPoint: – Paste the address below the question. – Highlight the address and make a link. – Select Link from the icon tool bar and paste the address into the “Link to a page location or local file” file” box. – Click okay. – The address text should have changed colors. (Note: You do not have to use the address as the link. Instead you can use the question.) SHOW example DESIGNING A CYBERHUNT: HOW? (4) Go to a new site and repeat Be sure to save your page to your home drive after every question. Add a title and directions to your Cyberhunt. They may be in different sizes, fonts, etc. Upload the page OR SAVE it Create a link to your page (if needed) Page 63 of 64 ADAPTABLE TO ENCARTA? HOW? PRAC Create your own Cyberhunt END Page 64 of 64