jump to navigation

Class Picture October 31, 2010

Posted by nightfox in Uncategorized.
add a comment

Congratulations for finishing the EDUC 190 course! :)

Reflection Extract #1 October 14, 2010

Posted by whitelilyjuno in Uncategorized.
add a comment

Truth be told, I didn’t expect to learn much from this course because I’ve heardpassive feedback from my friends who took up this course in the previous semesters. Iexpected that we would just waste away the three and half hours with Facebook, Twitterand other social networking sites. But the way this course is handled this semesterfailed to meet my expectations. However, failing to meet my expectations has moregood outcomes than bad. Undeniably, I have learned a lot of things from this course.

First and foremost, I’ve learned that Google is not just a search engine; it’s morethan just a website that gives you thousands of links that would put an end to yourunceasing search for knowledge. It can give you updates on topics of your own choice,links to blogs of your favorite topics, etcetera. Truly, information, in this day and age isnot anymore restricted to a chosen few. Information is readily available to everyonedisregarding social classes, race, ethnicity, gender, even religion. In line with this,teachers can also benefit much from Google’s services because it is an efficient tool forfinding reliable sources for their lessons inside the classrooms.

Although everyone can use Google, not everyone knows how to use it properly.In the previous group report, tips on how to get better results from this search enginewere given to the whole class.

Another striking topic discussed in this course was on the GNU Project or onGoing Open with regard to the use of the Operating System. Since I learned to usecomputers in grade school, Microsoft was already dominating the computer world. Thus,I was not able to explore other Operating Systems which are more user-friendly andwhich give the users more opportunities for learning and for improvement. Upondiscussing this topic, I felt like I have freedom, hence giving me the power to create.

Lastly, I have realized that the role of technology in education is indispensableespecially in this fast-changing world. Teachers, especially here in our country, do nothave an ease in using technology perhaps because of the lack of finances leading tothe lack of equipment and the lack of knowledge on the proper handling of theseequipment.

However, more often than not, teachers think that instead of providingconvenience, integrating technology in education can cause you more delays and moreproblems. Because of this thinking, teachers would often fall back the old techniquesand strategies in teaching inside their classroom. What they do not know, or what theyforsake to believe, is that technology can offer them more convenience, if and only if,they know how to properly acquire and manipulate these technological gadgets for theoptimum learning of their students. Furthermore, engaging the students to these kindsof experiences allow them to achieve fulfillment in their learning process.

On Richard Stallman’s We Can Put an End to Word Attachments October 14, 2010

Posted by whitelilyjuno in Uncategorized.
add a comment

“Knowledge without transformation is not wisdom.” Paulo Coehlo

This is the most striking line that I’ve ever read in Coehlo’s Brida, it’s simply said but has aprofound effect especially to me. Having had much knowledge about the GNU Project becauseof the previous session, I am already convinced that I have to head towards transformation, evenif it entails changing my blind habits and attitudes towards using Microsoft products. I havealready decided that doing so would be the wisest thing to do.

 

Part of this transformation would be spreading the good word to others, the way the apostles of Jesus, upon hearing their Master’s life-giving word, went to the nearby towns to preach about it. And I’m glad that I am already accomplishing this task, which started on the day I’ve heardabout the good word on the GNU Project and Open Source. Over dinner, I have vibrantly sharedmy knowledge with my roommates and they responded well to what I have just imparted.Moreover, I ended with a claim that I will be changing my Operating System to Linux in a fewdays.

 

Richard Stallman’s article on word attachments even strengthened my conviction to debunk theidea of using Microsoft softwares in my everyday life. All this time, I have been disillusionedthat using these products is giving me optimum security against viruses and plagiarists. But thenagain, Richard Stallman has proved me wrong, and for that, I am thankful that he had everimagined such an eye-opener project as the GNU.

On Apple iPhone 4 October 14, 2010

Posted by whitelilyjuno in Uncategorized.
add a comment

Reflection Paper

“The 21st century teacher toolbox that fits in my pocket,” is how Karen Bosch, a distinguished educator, describes the new iPhone 4. Upon watching the video on Youtube entitled “Teaching…there’s an app for that,” I was amazed at how the new version of iPhone can actually be used as an aide to teaching. Bosch proudly describes the new iPhone’s applications which are useful for teaching her 5th grade class at Southfield Christian School. Indeed, the applications featured in this new advent of technology are outstanding. Iphone has undeniably taken the lead in innovation among all other cellphone companies.

As what Bosch has mentioned, the new iPhone can be used as a book, recorder, TV, camera, media player, dictionary, map, and a whole lot more. Subject areas such as Geography, Language, Communication Arts, Mathematics, etc are accommodated using this technology. Interestingly, the basic features of a cellular phone are not undermined with these additional features. In truth, these basic features are even geared up for the convenience of the user.

Karen Bosch’s testimony on how convenient the iPhone 4 is for her as a teacher somehow made me envious. Who would, in his right mind, not be envious of all the convenience that little thing has to offer? Everyone, especially teachers would want to have this one of a kind technology that’s so handy, it can even fit into one’s pocket.

I am convinced that iPhone 4 is a truly convenient technological device for some teachers. I would say some because the economic burden of the target consumers of this breakthrough in technology should also be taken into consideration. Teachers in the first world countries like the USA are not having any trouble in purchasing this device and using it as an aide for instruction inside their classrooms.

However, in the developing countries such as the Philippines, purchasing this device would really cost a fortune. Aside from that, technology in the Philippine educational system is not yet stable since there are still teachers from the rural areas who have not yet touched a computer, what more a sophisticated device such as the iPhone 4.

Moreover, it is also notable that not all learners are digital learners. Therefore, the teacher should not rely solely on the iPhone 4 for the instruction of the learners. On the other hand, I take these factors as challenges also which need to be overcome in order to develop technology in the field of education here in the country.

Personally, I believe that not one instruction material is enough to ensure effective instruction especially among young kids. It is still good to have a variety of instructional materials or aides for instruction which will be used inside the classroom. Nevertheless, no matter what technological device or how creative a teacher’s instructional material may be, if it does not stimulate the learners to engage in the lesson and does not develop critical thinking among them, all these efforts lead to waste. In the end, teaching is not about the material used and was never about the teacher; teaching is all about how well the students learned from the teacher.

 

Better to be sure than to Regret September 28, 2010

Posted by ajmusikero17 in Uncategorized.
add a comment

I can still remember when I had a very bad experience with computer virus. My laptop, if I am not mistaken, was just few months old that time. I am not a techie person, so I was not aware of how an anti-virus really works. I have one, but I don’t know  that it must be updated frequently. Oh, sounds stupid. But that was before, since then, I became more conscious of these stuffs. I learned that to get rid of viruses, Linux or Mac are the operating systems that are preferred to use. Oh well, I am still using Windows but I see to it that I have an anti-virus. How I wish this would work effectively.

I also learned today the importance of security in using computer. I realized that whenever I am surfing the internet, my computer may be hacked. Definitely I don’t want to experience some stories of necessary files like theses that are corrupted.
However, I  wonder how hackers work. What I can only say is that, they are brilliant.

Moreover, I learned that having back-up of your files is important. Who knows, there will be a time that our files just disappear! It’s better to be sure than to regret in the end. Isn’t it?

True enough, great power comes great responsibility. Computers truly make our life much easier than before. Yet, there’s a big responsibility that lies behind the advantages that the digital world offers us. It’s our responsibility to take care of our access. Otherwise, we will be like losers in the end.

Computer Security September 24, 2010

Posted by ispirikitik in Uncategorized.
1 comment so far

The topic today in Educ190 takes me back to the myriad of computer maladies I had in the past. Once, I had a virus that attacked all my folders. I made an attempt to get back  my files by trying to download a new antivirus but it didn’t work. Antivirus packs come in rar format, so when I’ve extracted the file, it became a folder. Since the virus attacks folders, I wasn’t able to run the antivirus. In the end, I was forced to reformat my laptop. 😦 I got the virus from DLRC, by the way. There was also a time when my my word documents turned into applications. Sadly, I wasn’t able to recover them. No thanks to SC’s computer shops.

Anyway, here’s what I’ve got from today’s lesson:

  1. Always back up your files. Computer threats are certainly just around so make sure that you have multiple copies of your documents. It’s good to know that there are online tools such as Dropbox that can store files up to 2gb.
  2. Installing an antivirus and antispyware software does not guarantee computer safety. A few days ago, I scanned my flash disk in my roommate’s laptop, which by the way, is running three antivirus software simultaneously.  I was so convinced that my flash disk was cleaned since her antivirus were able to detect a number of viruses and malwares. However, when I plugged in my flash disk in the mac computer we are currently using in DILC, I saw four viruses (Recycler included)! Grrr!
  3. If you wish your computer to be safe, Use an OS other than Windows. Windows is just so prone to viruses since majority of computers are running Windows.  In contrast, it’s so easy to get rid of viruses in Mac, Linux or Ubuntu. Viruses come out as text files in these OS.

Here’s a picture of our group’s short skit…

Infection and Prevention September 24, 2010

Posted by ninabuns in Uncategorized.
add a comment

Protecting you computer is just like protecting yourself from a injuries or biological viruses. We must always take precautions to avoid pain and diseases. But if we do get hurt or infected, we must take several steps to cure what has ourselves.

There are a lot of stuff to be done protect a computer from from viruses, hackers, and other risks. I thought that viruses, malwares, and rootkits were all the same but now I learned that they are all different from each other and that they serve different purposes and functions. They infect files, programs, etc in different ways and they are also removed in different ways. There are a lot of ways to protect a computer and the files in it from harm. For example: enabling firewall, having an effective antivirus, creating an unpredictable password, backing up files both in the internet as well as in other hard drives, etc. But, we must also remember that there are also various ways to harm it. In short, we must always be careful in opening files, websites and other programs especially when we a connected to the internet.

Are You Safe? September 24, 2010

Posted by stephaniesaraos in Uncategorized.
add a comment

In our world today, a lot of people go through many heights just to get their hands on certain information they want and need. Some become hackers or crackers. The main question that internet or computer users must ask themselves is how safe are their files? Our professor today shared a story that he knew a person whose computer caught a virus, erasing all her files.  Included in those files was her thesis. The next time she wrote her thesis, she had her files backed-up but unfortunately, her laptop and external HD was stolen. Gone again was her thesis. When we back-up our files, we shouldn’t just make one copy but we should have a lot of copies. In this case, if ever something happens to one of them, we still have a lot of copies of our important files.

We should start being careful in what we put on the internet. There are so many hackers and crackers who can easily get our information. There are so many viruses that are going around too which can really jack-up our files. We shouldn’t give our passwords to anyone. We were told in class today that a couple had broken up. The girl knew the password of the guy’s account and she changed it. The guy couldn’t access his account anymore. No matter how safe we think we are, we shouldn’t put very private information on the internet. This way, we’ll know and feel 100% safe.

In class, we presented the Trojan virus. Once it gets into your computer, it copies your files over and over again. Make sure you have installed a very effective anti-virus to avoid such problems.

This is me as the Trojan Virus.

Protecting and Preventing September 24, 2010

Posted by pjpascua in Uncategorized.
add a comment

Today, I have learned that there are simple ways in protecting and preventing our computers and personal accounts from any threats(Trojans, worms, hackers, and many more). I just can’t name/discuss all of it. Hahaha.

Have a reliable anti-virus. Especially when you are Microsoft OS user.

Password for our accounts(e-mail , social networking sites, etc)should be at least 8 characters or more. And include symbols.

Starting today, I will make sure that my computer security is updated and working.

Ω|\| < ompu + 3/2 S3 < µ/2i+Ψ September 24, 2010

Posted by junglecheerio in Uncategorized.
add a comment

No. That isn’t a formula in Quantum Physics. Neither did Jejemons learn the Greek alphabet. If you did not understand the blog title, you’d know that l33t speak really  works.

The title actually meant “On Computer Security”, and leetspeak, an alternative alphabet of the English Language, are just some of the few tricks you can employ to maintain that security.

The rise of internet and computer usage in the years that passed has put our digital profiles at the risk of  security breaches everyday. And protection against these infiltrations have become ever so important. We try to use different “anti” tools and employ countless “virtual hedges” only to our dismay that they do not really work. Little did we know that the best security  that can be provided will only come from one source. Us.

It all starts with our behavior, our awareness. When we discover cool things in the internet, we naively try them out without looking into the risks that we may be exposing ourselves into. We want our e-mail, we want our Facebook, we want everything that everyone is trying out. Not saying that you should throw away your PC and transfer your residence somewhere in Fiji: all this is is to make our internet and computer use better and more secure. And as I have learned today in Educ 190, here are the few things you can do yourself to make maximize the security of our digital -selves.

1. If you can’t buy proprietary, try Open-Source. Do not pirate.

2. Learn more on the different malware and their functions, such as rootkits, trojans and worms.

3. Try Linux OS’s

4. Don’t be stupid. Change that birthday password. Try leetspeak.

5. Lastly, change that birthday password.

We did a skit today about rootkits. It was dreadfully embarassing, but you’d rather have that than the actual malware.