Team+Improvement

=Chapter 2 Summary = Self-Directed Learning Reflecting on technology tools used in the past to help you in the future Basic Technology Skills Use of portfolios for personal growth

Chapter 2 Vocabulary:
Self-Directed Learning Metacognitive Assessment Portfolios Employment Portfolios Professional Development Portfolios

=﻿ ﻿Chapter 3 RAP =

Active Learning and Holistic Activities
Authentic instruction os based on active, experiential learning. People learn best when they are actively involved. You must be mentally active, not necessarily physically. How technology supports learning by doing: 1. Allows you to represent ideas in a variety of ways 2. Allows you to manipulate information and interpret the effects of manipulations 3. Represents and simulates real-world problems and situations 4. Gives students access to people, resources, or locations that would otherwise be impossible to get to Activity MUST be supported by reflection and articulation---learners need to describe what they did, the result, and why that result happened

Authentic instruction is holistic. We gain important skills by learning them in a meaningful context. Referred to as "just-in-time" training. Technology allows learning to occur within real contexts. Enables learners to make connections across content areas and solve complex problems. Can be done without technology, but would be much more difficult, take longer, and restrict the effectiveness and understanding.

=Chapter 4 RAP=

Computer as Tutor
-Computer can be used as teaching machine -Can be adapted for abstract and complex skills -Computer based tutorials: provide lesson on specific topic -Advantage: Able to provide sophisticated feedback at the level needed by individual students -Intelligent Tutoring System (ITS) -Characteristics of Effective Computer Tutorials -Webquests: An organized format for presenting lessons that utilize web resources
 * 1) Presenting new information
 * 2) Providing Practice
 * 3) Evaluating Student Learning
 * Tracks student response, makes inferences about strengths and weaknesses, then tailors feedback
 * Problems have meaning for students
 * Engage learners with content
 * On-screen prompts ask group to collaborate
 * Resources for discussion provided
 * Consists of 5 parts and teacher page
 * 1) Introduction that motivates and prepares students
 * 2) Clear statement of intended outcome of lesson
 * 3) Steps students should follow
 * 4) Criteria for evaluation
 * 5) Concluding activities where students reflect and extend

Chapter 5 RAP
1. Whole Group --Most effective use of single computer $Typically used as presentation devices $Data Projector: Connects to computer and projects desktop image to wall, screen, or whiteboard &Can also use LCD panel or large monitor --Make sure all students can see --Always schedule equipment in advance 2. Summary of Technology-Enriched Learning Environments --Any instructional grouping can occur with almost any physical arrangement of computers $Single Computer: Run simulations, model projects, support discussion, guide students, connect classroom to outside world, and more $Few Computers: Have students work on individual or group projects, whole class instruction &Group work increases conversation level which leads to greater learning

i. A Troubleshooting Model 1. Isolate the Problem a. Identify the problem b. Isolate symptoms 2. Identify the Best Solution a. Try the tips in your manuals or on the manufacturer’s website b. Use discussion forums c. Call a technician or the product help line d. Ask students or colleagues 3. Apply a Solution and Check Your Results a. Try them one at a time b. Before applying subsequent solutions, try to return the entire system to the way it was before you started 4. Repeat, If Necessary a. Until a solution is found b. Don’t overlook human error i. Four distinct areas of hardware maintenance 1. Routine Servicing a. Enemies of electronics: heat, power fluctuations, unwanted liquids b. Cleaning cooling fan on regular basis c. Remove dust d. Avoid getting liquids on/near computers e. Use surge protectors or uninterruptible power supplies f. Avoid static electricity g. Periodic cleaning of peripherals 2. Repairing a. Only a few components can actually be repaired economically b. Most components require replacement 3. Replacing Consumables a. Light bulbs, paper, ink cartridges b. Encourage students to conserve resources 4. Adding Components a. Upgrading computer to increase capabilities
 * 1) Maintaining Technology Resources
 * 2) In networked environments, technology personell can oversee everything from a distance
 * 3) Solving Routine Problems
 * 1) Hardware Maintenance

=Chapter 10 RAP= i. By installing a technology-based solution to block material deemed objectionable as outlined in the act ii. By adopting policies to monitor Internet use by students i. Malicious Software 1. Spam: unwanted messages across many technologies (including e-mail, fax, IM, blogs) 2. Phishing, Carding, or Spoofing: A type of span that asks for sensitive personal information 3. Malware: illegal a. Virus: A software program that can attach itself to another program, replicate itself, and cause damage software or data on the computer b. Worm: Replicates itself like a virus but doesn’t need to be attached to another software program c. Trojan Horse: Doesn’t replicate itself, but can cause sever damage to a signle computer. Can delete all data stored on the computer or can cause the computer to turn itself off immediately after booting up 4. Spyware: records usage patterns and can collect sensitive information transmitted using computer 5. Adware: incorporates the presentation of advertisements as a condition for operating software 6. Steganography: malware that is hidden in text files or pictures 7. Firewall: hardware and/or software that can prevent unwanted persons, messages, or software from entering a network or computer 8. Virus-protection Software: commonly used to scan files introduced to a computer or for periodic scanning of all files on a computer 9. Tips: be cautious of opening messages with misspelled words or irregular use of uppercase letters or symbols 10. Don’t open documents ending with .exe ii. Threatening or Unlawful Online Interactions 1. Cyberbullying: the use of technologies to harass, defame, or intentionally harm another student or group of students 2. Common methods of cyberbulling a. Messaging b. Creating website c. Pictures, videos, and other recordings d. Impersonation 3. Schools may not be able to stop cyberbullying unless written into AUP 4. Cyberstalking: engaging with a predator a. Students may unwittingly provide sensitive info to others b. Educate students about protecting info 5. Teachers should know web abbreviations!
 * 1) Internet Safety
 * 2) Children’s Online Privacy Protection Act (COPPA)- limits info collected from anyone under age 13
 * 3) Children’s Internet Protection Act (CIPA)- Requires schools and libraries receiving funds from the Universal Service fund to incorporate technology-based solutions that block access to material defined as obscene, pornographic, or harmful to minors
 * 1) Protecting Students and Technology Resources

Team Improvement Wiki