Sanders

ABOUT ME

My name is Kylene Sanders. I have been teaching for 3 years. This is my second year in 3rd grade in the Tulpehocken Area School District.

In my classroom we use laptops regulary (COWS) mostly for PSSA prep on studyisland.com. We also use the laptops for research and writing projects. Students have computer class once a cycle where they learn basic typing skills and search engines. We have portable smart boards to use in our classrooms and our building is currently under construction, but in our new classrooms we will have smart boards so I am continuing to learn how to use that in the classroom.

Gmail account: kylenesanders@gmail.com

Harcourt is a site that is a useful tool for teachers and parents using the program. [|Click Here.]

I find that I like facebook better than myspace. I used to have a myspace account and I found that on facebook it was easier to navigate, not as many pop ups or ads, and just seems like an overall better layout. Facebook also seems to have updated alot of its features and I think it is a good way to communicate with friends easily. I also think it is more secure than myspace, but that is just my opinion.

BLOGGING

I think blogging would be beneficial or more appropriate for older students. I think it would be a good way for communication between students, teachers, and parents. The grade level I teach would be a little too young for this to benefit, but I did have professors in school that used blogging for classes. I find that for my age group, teacher websites are easier. But it seems that blogs would be a good way to teachers to communicate with each other as well and share ideas, etc. From the ones I looked at it seemed most posted things that would benefit other teachers. I definitely think blogging will be something that does become more popular with upper grade levels.

BILL OF RIGHTS
 * 1) Do you agree with all of the items covered in this Bill of Rights? Why or why not?
 * 2) Yes I agree with all of the items covered because it covers both individual issues and institutional issues, both their rights and responsibilities which covers all ends.
 * 3) What do you disagree with?
 * 4) I didn't really notice anything in particular that I disagreed with
 * 5) Do you plan to abide by these guidelines? Why or why not?
 * 6) Yes, these guidelines apply to using technology on a daily basis and relate to both my personal usage and usage within my school district so I would apply by these guidelines for the most part.
 * 7) Do you think they leave out anything important? Why or why not?
 * 8) No, nothing stands out as missing from these policies. It covers most topics I would address with technology usage.
 * 9) What's not covered that should be?
 * 10) There is nothing that I see that is missing.

Viruses

Then, find out what are top 3 latest computer virus threats listed by the following web sites. Which of these viruses do you think are the most lethal to your computer? Describe how the virus may affect your computer and discuss why you think it is the most dangerous on your wikipage.

These were 3 of the most recent that I found on http://www.symantec.com/norton/security_response/threatexplorer/index.jsp

All three of these said that their risk level was low (rating of a 1). However, I would say W32.SillyFDC.BDB would be most lethal because it affects hard drives and has a medium distribution level instead of a low level. All the viruses affect Windows programs which would be harmful. (Ex: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003, Windows 2000 W32.SillyFDC.BDB is a worm that spreads by copying itself to removable drives. It also disables certain system software.) Since you use most of those items regulary on your computer, that would definitely affect your computer in a big way.


 * ||  || [[image:http://www.symantec.com/avcenter/graphics/ssrc/bar_1.gif]] || [|Trojan.FakeAV!gen2] || Trojan || 10/05/2009 ||
 * [[image:http://www.symantec.com/avcenter/graphics/ssrc/bar_1.gif]] || [|Backdoor.Tidserv!gen] || Trojan, Virus, Worm || 10/05/2009 ||
 * [[image:http://www.symantec.com/avcenter/graphics/ssrc/bar_1.gif]] || [|W32.SillyFDC.BDB] || Worm || 10/04/2009 ||  ||   ||

||  ||

Internet Hoaxes

= Avi Ben Stella Prayer Request =


 * A viral prayer request circulating on Facebook and Twitter asks for prayers on behalf of a 12-year-old boy named Avi Ben Stella, who is allegedly in a coma after a serious car crash.**
 * Description:** Prayer request / Possible hoax
 * Circulating since:** Aug. 2009
 * Status:** False

//Facebook example contributed by Teresa D., Aug. 24, 2009://
 * Variant #1:**

Prayers are needed for 12yr old Avi Ben Stella who, after a serious car crash, is now lying in a critical coma. Please change your status for 1 hour so more people can become aware and add to the prayers. We would do it for your son so please do this for somebody else's son as well. Thank you

This is an internet hoax explain or chain email or prayer email that was proved to be false. I get these sometimes on my junk email addresses or from people at work where they want you to pass them along. I usually just assume all chain emails like that are false and don't forward them on again.

Choose a scenario that is of interest to you. Explain how your district AUP policy would address the issue. How would you suggest the district go about handling the situation?

I chose scenario #2: Lester sends e-mail to the entire student body inviting them to a BYOB party at his house while his parents are out of town. Lester receives a message from a system administrator calling him in for a meeting with school officials. He objects because he feels that his e-mail is his own private business.

Our AUP would address this scenario under Illegal Activities: Section c. which states that students will not use the school's computer network to engage in any other illegal act, such as arranging for a drug sale or purchase of alcohol, engaging in criminal gang activity, threatening the safety of person, etc.

My suggestion would be that the district revoke all computer privileges for the entire school year, as well as have a mandated meeting with the students, administration and parents to determine whether legal action or school suspension would be necessary depending on the depth of the actions.

Google Earth I could use with 3rd graders because we talk about landforms and geography and when you zoom in on certain places you can see the topography of the land. We also talk about government so we could find the capital building and the white house. Students could use it as well to get visual imgaes of city areas, suburbs, and rural areas which we talk about when we do communities.

Studyisland Jing Video media type="file" key="studyisland_jing.swf" width="360" height="270"

Mrs. Sanders' Podcast

media type="file" key="podcast ksanders.wav" width="300" height="50"

You Tube Video

media type="youtube" key="IIt5lGhFyE0" height="344" width="425"

Windows Video

media type="file" key="Movie_0001.wmv" width="300" height="300"

Video Conferencing

I think video conferencing can be very beneficial in the classroom. I have not used it yet in my classroom, however I recently attempted to sign up for a TWICE video conference with a classroom from Florida. Although I don't believe they selected us, after discussing TWICE with Sue today, I believe I will do a lot more searching on the engines she showed us in an attempt to have my students use video conferencing at least once this year. I am also hoping to have my students video conference with their pen pals in Florida. I think they would really enjoy doing that. I also think using video conferencing for Read Across America week would be an awesome experience for students. There are definately a lot of opportunities I saw using TWICE, CAP space, and ASK. Another engine that our computer teacher (Jen) told me about is: magpi.net

Personal Wiki Page Bethel Third Grade Wiki