Name: June 16, 20057:23 PM \ (1) Focus of your portfolio: The goal of SED 514 is to equip teachers with technical and pedagogical skills to enhance teaching and learning. You will prepare a 514-portfolio (electronic or paper) of your work, illustrating how computer technologies can be used to improve the teaching and learning of a particular unit within your discipline. By the time you are done with this class, you will have collected and developed resources that will benefit you and your students. Please note that many of the activities in this portfolio may be also used as artifacts for your professional teaching portfolio (PDP) . • • Complete the title page of the portfolio that includes you’re a photograph of you, your name, school, subject taught, and topic for portfolio. Identify the subject and topic for which your 514-portfolio will be developed. Briefly describe the significance of this topic with respect to your curriculum. Name Mariam Nazloyan Subject taught English –Secondary topic(s) for portfolio Persuasive Writing The emphasis is on the persuasive writing process. Students learn that Persuasive writing allows them to use the power of language to inform and influence others. They also learn through various smaller persuasive assignments that good persuasive writing 1) clearly states the issue and the writer’s position 2) gives opinions and supports them with facts or reasons 3) has a reasonable and respectful tone 4) takes into account and answers opposing views 5) uses sound logic and effective language 6) concludes by summing up reasons or calling for action 1 Name: June 16, 20057:23 PM By learning to write persuasively, students develop the necessary skills to communicate and get their perspective across smoothly and professionally. With this skill, debating and convincing in the professional arena is of utmost importance. Without a good means of communication, there can be many obstacles that can hinder one’s social, familial, and personal life. (2) Documenting your work with screen capture: Screen capture programs allow the user to take pictures of anything on their screen and save them as graphics files. Download a screen capture program for your home computer and use it to take pictures of items required in this portfolio. • Demonstrate competency with a screen-capture utility by inserting a .jpg file of keyboard shortcuts, contextual help menu, of the operating system you are using. Note that virtually all programs and operating systems have help menus and keyboard shorcuts. Consult these electronic help menus when you need to know how to perform a particular operation. (3) Backing-up and transporting your files: Always backup your files!!! You can: (a) save them on USB drive or portable hard drive, (b) upload (ftp) them to your CSUN account (uDrive), (c) move them to an Internet hard drive, or (d) send them as attached 2 Name: June 16, 20057:23 PM files accompanying email messages. Do one of the following: • Save your work to your uDrive. The uDrive is an extra storage area that provides additional disk space for campus users who wish to store their desktop files and folders on a remote server. Include a screen capture. • Develop an Internet hard drive using the Yahoo briefcase or similar resource. You can send your files to your Internet hard drive and then retrieve them at home or school. Include a screen capture. 3 Name: June 16, 20057:23 PM (4) Learning about your students. Most secondary school teachers must learn the names of 150-200 students at the beginning of each academic year. This formidable task is made much easier using a photographic seating chart. *TPE-tip Teachers may use photographic seating charts, combined with student information surveys to learn about their students early in the semester (TPE 8). Make certain to check with your school regarding policies for photographing students. • Use a digital camera to make a seating chart for one of the classes you teach or for this class at CSUN. 4 Name: June 16, 20057:23 PM (5) Searching / Identifying Plagiarism. The ease of information access can accelerate the learning process, but it can also be counter-productive by facilitating plagiarism. Discuss the importance of intellectual honesty with your students and illustrate how you can easily identify work plaigiarized from sites on the Internet. • Using an advanced search engine with Boolean search features (such as Altavista), find text from one of your students or from a website related to your field that appears to be plagiarized. Copy and paste the text and the URLs of both pieces in question. Alternatively, you may wish to use an online plagiarism detection service such as tunitin.com 5 Name: June 16, 20057:23 PM http://en.wickipedia.org/wik/photosynthesis (6) History of computers / graphic search engines. Answer the following questions using information from technology education websites or other online resources. Make certain that all information is in your own words. No credit can be given for information that is identical to that of another student or a web page. • Contributors to the development of the computer: Select five individuals who have made significant contributions to the development of the computer. List the contribution(s) of each individual and briefly describe its importance. See technology education websites. Use a graphic search engine to find pictures of each. • Computer Generations: Computer historians have classified computers into "generations" in an effort to identify the major technological advances upon which the computers are built. Briefly identify the major features of each of the first five generations of computers. See technology education websites. Use a graphic search engine to find pictures of each. Photo Contributions to the development of computer A mathematical genius, Turing proved instrumental in codebreaking efforts during World War II. His application of logic to that realm would emerge even more significantly in his development of the concept of a "universal machine. Reported to be the richest private individual in the World with a net worth of over 50 billion dollars. He dropped out of Harvard to pursue a career in software, founded Microsoft in the 1970s with Paul Allen. See the "official" bio at Bill Gates' Microsoft Web Site or Bill Gates: Before Microsoft by John Mirick Invented/developed the Mark I 6 Name: June 16, 20057:23 PM He is the inventor of the electronic digital computer Founded Microsoft together with Bill Gates generation First Second Third Fourth Fifth Photo of key component Features The ENIAC was the first successful electronic digital computer. The Fiftieth Anniversary of ENIAC is fast approaching. The IBM 360 was a revolutionary advance in computer system architecture, enabling a family of computers covering a wide range of price and performance. The LGP30 was built by Litton General Precision in the mid 1950's. It was implemented with vacuum tubes and drum memory. It used a Flexowriter for I/O. The instructions had three addresses, two for the operands and one for the next instruction. Digital Equipment Corporation's first 7 Name: June 16, 20057:23 PM computer was the PDP-1. (7) Making computers accessible to students: Given the importance of computers in business and society, it is important that we provide students who have special needs access via specialized software and hardware. Describe three data input or output devices, or three OS or software options that may be used to make computers more accessible to students with specific physical handicaps. *TPE-tip If you have students with special needs in your class, you may wish to develop lesson plans illustrating how you have made your curriculum accessible to them using adaptive hardware and/or software. (TPE4) • Experiment with the universal access features associated with your computer's operating system and research third-party hardware and software solutions for those with special needs. Describe three hardware or software solutions and explain how they may help students with specific special needs. 1)Sticky keys is a feature of computer Desktop Environments. It is an accessibility feature to aid handicapped users. Sticky keys allows the user to press a modifier key, such as Shift, Ctrl, Alt, or the windows key, and have it remain active until another key is pressed. It is activated by pressing the shift key 5 times in sequence or by holding down a modifier key for longer than 5 seconds. When sticky keys is activated, a beep is sounded whenever the Shift, Ctrl, windows key, or Alt keys are pressed henceforth. STUDENTS, WHOSE HEARING IS IMPARED, CAN USE THE STICKY KEYS TO REMAIN ACTIVE ON A CERTAIN TASK UNTIL ANOTHER KEY IS PRESSED. 2)Flash Saver enables you to save all Flash animations from internet, including Flash websites, Flash game, Flash MTV, Flash Movie, Flash advertisement, or what ever Flash files you find in the web. What you need to do is just a simple click! All Flash (swf files) will be downloaded from web browser to your local hard disk. You can classify downloaded flash files, change names, add comments, play, snapshot and more. STUDENTS, 3)Voice over Internet Protocol (also called VoIP, IP Telephony, Internet telephony, and Digital Phone) is the routing of voice conversations over the Internet or any other IP-based network. The voice data flows over a generalpurpose packet-switched network, instead of traditional dedicated, circuitswitched voice transmission lines. 8 Name: June 16, 20057:23 PM (8) Computer knowledge. Teachers should be conversant with computer terminology and concepts that pertain to the use of technology in their classrooms. • Review the list of computer terms and concepts for educators and then take this online quiz. Retake the quiz until you understand the terms and concepts and score 90% or better. Include a screen shot of your first and final test results. *TPE-tip If you have access to an online test-generation system such as WebCT, Blackboard, or Quizmaker, you may wish to develop online self-quizes for your students. (TPE2, TPE3) Answers: SED 514 Computer Terminology and Concepts for Teachers . 0. Which of the following is a true statement regarding operating systems?Your answer: Without an operating system, no programs can runCORRECT! . 0. Which of the following is/are tasks of the operating system?Your answer: all of the aboveCORRECT! 0. 0. Which of the following requires the greatest bandwidth?Your answer: streaming high definition videoCORRECT! 0. 0. Which of the following best describes a blog?Your answer: A web log on which students can share their journalsCORRECT! 0. 0. Beta software …Your answer: all of the aboveCORRECT! 0. 9 Name: June 16, 20057:23 PM 0. Which of the following represents the largest amount of data?Your answer: terabyteCORRECT! 0. 0. Which of the following graphics files would NOT appear pixilated (show blocky pixels) if enlarged?Your answer: vector graphics (created by Freehand, Illustrator, etc.)CORRECT! 0. 0. When information is uploaded it…Your answer: Sent to a host computerCORRECT! 0. 0. If the performance (speed) of your computer has dropped and you hear a lot of sputtering noises from your computer, it is likely that you need to:Your answer: Defragment your hard drive so files are no-longer broken in many pieces, but stored efficiently so they can be read more quicklyCORRECT! 0. 0. When purchasing software for your school, you should invest in cross-platform software if:Your answer: Your student laboratory has Macs and PCsCORRECT! 0. 0. A school acceptable use policy (AUP) should includeYour answer: all of the aboveCORRECT! 0. 0. Which of the following has the greatest need for encryptionYour answer: Passwords for students to access their grades onlineCORRECT! 0. 0. Wired and wireless communication have revolutionized research capabilities for teachers and students. Which of the following communication term pairs are not paired correctly?Your answer: IEEE 1394 – InfraredCORRECT! . 10 Name: June 16, 20057:23 PM 0. There is a lot of erroneous information on the Internet, and this can cause tremendous confusion, particularly as students perform research for reports. However, students should always be able to trust data from the following domain:Your answer: none of the aboveCORRECT! 0. 0. Which one of the following is incorrectly matched?Your answer: GUI - English class Shakespeare projectCORRECT! 0. 0. If students complain that your laboratory computers are too slow to operate software for your class, you might request that school techniciansYour answer: replace 512 MB DIMMs with 1 GB DIMMsCORRECT! 0. 0. Which of the following would be classified as edutainment?Your answer: AlgeBlaster, Oregon Trail, Discovery ChannelCORRECT! 0. 0. Many application programs (word processors, spreadsheets, databases) store data as text files. These ASCII (text) files are given the .txt extension. Why would a teacher be interested in saving files in this format?Your answer: 1 & 2CORRECT! 0. 0. Most school and district networks have firewalls. Which of the following is NOTMany schools encourage their students to save files on compact flash or secure digital cards (also known as CF cards, USB drives, jump drives, thumb drives, multimedia cards). Which of the following is NOT a reason fYour answer: A firewall protects the network from spontaneous combustionCORRECT! 0. 0. Many schools encourage their students to save files on compact flash or secure digital cards (also known as CF cards, USB drives, jump drives, thumb drives, multi-media cards). Which of 11 Name: June 16, 20057:23 PM the following is NOT a reason for advising students to purchase such devices.Your answer: They are cheaper than CDsCORRECT! 0. 0. Extensions help users and software identify file types delivered via the Internet. Which of the following sets of extension is most commonly used in education.Your answer: .jpg .mp4 .pdf .doc .xls .ppt .gif .txtCORRECT! 0. 0. Students should be taught good netiquette, particularly when accessingYour answer: Email, newsgroups, web logs and chatsCORRECT! 0. 0. Students should always be encouraged to save their work on two forms of secondary memory storage such asYour answer: Hard drive, optical discCORRECT! 0. 0. Which of the following is an example of analog, rather than digital data?Your answer: A Monet paintingCORRECT! 0. 0. When ordering software for your school, it is important to check “system requirements”. Which one of the system requirements is mismatched?Your answer: Graphics card / Power PC G5, 2.0 GHz or betterCORRECT! 0. 0. Campus networks are particularly prone to “infection” from malicious code and unwanted files that may decrease performance, fill hard drives, or corrupt files. All of the following fall into this category except:Your answer: System files, startup filesCORRECT! 0. 0. Data/video projectors can be used to display graphics and text related to your curriculum. Which of the following data 12 Name: June 16, 20057:23 PM projctors would give the sharpest and brightest image, and therefore be the easiest for students to see?Your answer: DLP / 3200 lumens / 1024 x 768 pixelsCORRECT! 0. 0. Which of the following would allow students who were unable to attend school (e.g. for medical or distance reasons) to participate in real-time classroom discussions.Your answer: asynchronous streaming video of the classCORRECT! 0. 0. Which of the following should schools have to prevent damage to their computers or restore systems that have crashed?Your answer: surge protector / spike protector / virus scan software / boot CD / password protected access /firewallCORRECT! 0. 0. Which of the following provides teachers may cause greatest frustration to a teacher who is trying to post his or her grades to the secure school website?Your answer: 56K dialupCORRECT! Total score: 30/30 (100.00%). 514 website Generated by CorrectQuiz 2.0. CorrectQuiz 2.0 for QuizServer authored by Ritchard Shadian. © 1998 University of Hawaii. Developed for the University of Hawaii Office of Technology Transfer and Economic Development in cooperation with Maui Community College. All rights reserved. Any copying, distribution, or preparation of derivative works is strictly prohibited. 13 Name: June 16, 20057:23 PM 14
© Copyright 2026 Paperzz