12 Things You Should Know to be Computer/Tech Literate
Transcription
12 Things You Should Know to be Computer/Tech Literate
12 Things You Should Know to be Computer/Tech Literate It is tempting to think that because you have used a computer for a long time, you are “computer literate” or “computer savvy,” but this is not always the case. Here are a dozen skills you should know to be considered computer literate in today’s job market. If you do not know these or are not sure, you can follow the detailed outline with information on each of the twelve topics. If you already know these, you should be helping others learn them as well! http://goo.gl/uSmdu 1 Please leave comments, suggestions and/or questions at http://goo.gl/xeUkd For a copy of the Scope & Sequence by Gradevisit http://goo.gl/tcp2k 12 Things You Should Know to be Computer/Tech Literate by Anthony A. Luscre is licensed under a Creative Commons AttributionNonCommercialShareAlike 3.0 Unported License. Based on a work at www.searchfindknow.com. 2013 by Anthony A. Luscre [email protected] or [email protected] Portions of the material on types of Plagiarism are from http://plagiarism.org/plagiarism101/typesofplagiarism (In the interest of disseminating this information as widely as possible, plagiarism.org grants all reprint and usage requests without the need to obtain any further permission as long as the URL of the original article/information is cited.) 2 1. Understanding Computer/Technology Hardware It is tough to have someone help you with a problem when you tell them that your “hard drive” is unplugged, when you really mean “the computer.” There are a number of common hardware misunderstandings out there, and while some are understandable (for instance, confusing a network interface with a modem- cables look similar and they serve the same purpose, networking), knowing basic hardware terminology is a must-have skill to be a savvy user. 2. Operating System Basics Names of device types or generations of computers are often derived from their Operating System (OS) name. Operating Systems are the software that enables hardware devices to function and allows programs/Apps to be run on the device. All computing devices have an operating system. In addition to brand or type of OS there is usually a version number or name (Windows 7, iOS Tiger, Android Ice Cream Sandwich, etc.) Understanding a device’s Operating Systems allows you to more efficiently use your device, make decisions on which type of device you want to buy and which software programs, Apps and/or hardware peripherals are compatible with it. 3. Effective & Efficient Web Browsing It is almost painful to watch some “computer savvy” people operate a Web browser. The most obvious goof is going to a search engine to type in the address of the site they want to go to. But folks are unaware of a lot of other things they do that make the Internet more difficult than it needs to be. Mastering techniques like opening links in new windows, using bookmarks, editing URLs to perform navigation, clearing the browser cache, and understanding common error messages will give you access to a world of unlimited information instead of keeping you stuck with only what Web site designers make obvious. 4. Searching & Search Engines Using a search engine is more than typing in the address, putting a couple of keywords into the big text box, clicking Search, and choosing the first result. While that may work, it won’t give you the best results much of the time. Learning the advanced search, Boolean operators, and how to discern good results from bad results goes a long way toward enabling you to use a computer as a powerful research tool. 5. File/Document Management It is not very productive if you cannot find it after you have create it. Files also contain much more information; including dates, attributes, user data, etc. 6. Using Productivity Tools a.k.a. “The Intuitive User's Guide to finding your way around in almost any software”. Most computer programs share very similar layout and functions. By learning the basics, users can easily adapt to use of new software. Savvy users will find that there are multiple ways to accomplish a task in a program, including menus, context sensitive right click menus, & keyboard shortcuts, and will find the best choice for them. 7. Spreadsheets & Databases Spreadsheets were the killer application that got a lot of businesses to pony up big bucks for a PC in the early 1980s. Spreadsheets offer incredibly powerful analysis possibilities… if you know how to use them for more than storing the holiday card address list. Being able to use formulas, references and macros can turn a “grid of numbers” into actionable info in the hands of the right person. Students and teachers need to understand how spreadsheets can be used across the curriculum as a tool to gather, sort, filter, calculate and analyze any type of data not just numbers. Whether it is a phone number, bank account, list of available items in an online store, library catalog, employee record, etc. databases play an important role in many aspects of our daily lives. Databases store information arranged for ease and speed of search and retrieval. They can store very large amounts of data. Just as in spreadsheets, databases can also be used to sort, filter, organize and analyze information. 3 8. Word Processing Word processing is one of the oldest uses for a computer. And it continues to be extremely important, even though in many ways its functions have been put into other applications. (For example, people may write more emails than documents, but the task is nearly identical.) It is tough to claim to be computer literate if the basic functions of word processing — like spell check, table creation, and working with headers — are outside your capabilities. 9. Copyright, Citing Sources and Plagiarism Students need to understand copyright laws and rules, how to cite a resource, and how to integrate someone else's work into their own work properly. 10. Presentations More than just words and pictures, a good presentation can pack more punch than a simple document. Once a picture was worth a thousand words, today we can also add video, audio, animation and simulations to our presentation. Presentations can be active, where the viewer determines the content based on their selections. 11. email, Internet & Social Networking Etiquette and Safety In an increasingly connected world it is imperative that you are an effective, efficient and safe user of the web. Are you sure you know what is in that attachment you are emailing and who you are sending it to, what information is your smartphone providing others, how you are being tracked on the web, how a web page really works, what the “Cloud” is or that the photo file you are sharing has hidden information on your location? It is a dangerous world out there! You absolutely must know how to protect yourself from attackers on the Internet and keep your personal data private. Everything from knowing to check a link before you click it to verifying that encryption is being used to transmit sensitive data to researching sites before giving them your personal data are all critical skills for the modern computer user. If you do not know how to keep yourself safe, you need to learn how. 12. Finding, Choosing, Using and/or Developing Software Apps, Online Tools & Simulations How to find, evaluate, and use apps for school and business. Also, how to find quality, free alternatives to paid software, apps and services. Finding and using Web 2.0 Tools including- calculators, simulation tools & other interactive tools. Usage of Simulation/Modeling software to observe, learn or interact with manipulatives to better understand concepts and processes. Understand how to work with online tests, surveys and other information gathering tools. Develop software programs, apps or robotics. 4 Evaluation Rubric Levels 0 None/Limited Proficiency Has little or no knowledge and/or unable to perform most tasks I Introduction Beginner Can do very basic operations; can perform additional basic tasks with assistance. D Developing Has varying skill set, but can do many basic tasks independently. Requires significant teacher intervention for additional concepts, more advanced uses, correction of errors, etc. R Reinforcement Knowledgeable. Has been exposed to both basic & more advanced tasks but has not mastered skills P Proficient Can do most operations independently; can perform advanced tasks with assistance. Has good understanding of concepts. Can teach/assist most concepts to others A Advanced/Highly Proficient Can do majority of operations independently, can perform very advanced tasks with assistance. Has level of understanding of concepts that allows teaching/assisting others of any proficiency level. Scope & Sequence Student computer skills will vary at any grade level, just as student achievement across the curriculum. Opportunities to provide direct instruction will also vary depending on scheduling, other time constraints, ability to integrate technology into other learning objectives and projects and other factors. Because of these factors it is difficult to have a hard and fast scope and sequence and instead we will provide “bands” of skills and levels that may stretch across more than one grade level. The scope and sequence objectives have been color coded to assist in visualization of both grade level proficiency and mode of instruction (none, introductory, refinement, reinforcement and student independently utilizes tool or concept.) Proficiently Instructional Mode 0 None/Limited Proficiency Has little or no None Code White knowledge and/or unable to perform most tasks. I Introduction Beginner can do very basic Introduction of new concepts, tools operations; can perform additional basic tasks with and skills. assistance. D Developing Learning new concepts/features. Has Requires significant teacher varying skill set, but can do many basic tasks independently. Pink Purple intervention for additional concepts, more advanced uses, correction of errors, etc. R Reinforcement Knowledgeable, has been exposed Reinforcement, needs projects and Blue P Proficient Can do most operations independently; Student works independently, may Green to both basic and more advanced tasks but has not tasks to reinforce skills and move completely mastered skills. toward proficiency. can perform advanced tasks with assistance. Has require teacher answers to good understanding of concepts. Can teach/assist challenges. most concepts to others. A Advanced/Highly Proficient Can do majority of operations independently, can perform very advanced tasks with assistance. Has level of understanding of concepts that allows teaching/assisting others of any proficiency level. Student works independently, can find Gold answers to challenges without teacher intervention. Can instruct/assist peers. Is on track for a technology oriented future. For a copy of the Scope & Sequence by Grade, visit- http://goo.gl/tcp2k 5 6 7 8 9 I. Understanding Computer/Technology Hardware a. Types of systems i. Separate Components 1. Display/Monitor 2. Computing Device a. Case containing i. Power Supply ii. Motherboard iii. Memory (RAM) iv. Hard Drive v. Optical Drive (CD, DVD or BluRay) b. External User Interface Devices i. Keyboard ii. Mouse or Trackball iii. Touch Screen c. Input and Output Connectors/Ports i. Video Output 1. VGA or DVI (to monitor) 2. HDMI to TV ii. USB (can serve multiple functions including printing, data iii. iv. v. vi. transfer, charging, powering external devices, etc) 1. Available in three sizes/configurations a. Standard b. Mini c. Micro 2. Available in multiple port speeds (1.1, 2.0 & 3.0) higher speed devices are backward compatible with slower port speeds. Sound Output to Speakers/Headphone Sound Input from External (or built in) 1. Microphone 2. Other audio device (MP3 player, TV, etc.) Memory Card Readers/Storage (SD, Micro SD, Compact Flash, etc.) 1. From Camera 2. Additional Storage of data Network Connection (NIC) 1. Wired (CAT5) 2. Wireless d. Miscellaneous 10 i. ii. iii. iv. FireWire (similar to but not compatible with USB) Serial/Parallel ports (similar to but not compatible with USB) Modem (phone line connections) Builtin speakers ii. Allinone System 1. Have many of the above components built in 2. Most also include a. Builtin battery b. External Charger/Charging Cable c. Builtin Cameras d. Motions/Position Sensors 3. Types a. Laptops b. Tablets c. Smart Phones d. Desktop Monitor/Computer allinone combinations b. Identifying and adjusting hardware components i. Monitors/Displays 1. Understand screen resolution 2. Adjust settings 3. Safe cleaning ii. System Settings iii. Network/Wireless Connections 11 II. Operating System (OS) Basics a. What it is i. Operating Systems are the software that allows all computing devices to operate. (http://www.youtube.com/watch?v=MzVGL44eq9w) ii. The OS controls all hardware and peripherals and allows you to run software programs or Apps. iii. Most also have firmware software that works with your OS. The firmware is usually specific to your hardware in many cases the firmware is partly made up of the computers ROM BIOS (Basic Input/Output System) iv. Different types and versions of Operating Systems 1. Windows 8, Windows 7, Windows Vista, Windows XP, Windows 98, etc. 2. Mac a. Mac OS X Tiger, Leopard, Snow Leopard, Lion, Mountain Lion, etc. b. iPad, iPhone, iPod iOS 4, 5 , 6, etc. 3. Android Jelly Bean 4.1/4.2, Ice Cream Sandwich 4.0.x, Honeycomb 3.x & Gingerbread 2.3.x , etc. 4. Linux (as know as Distros) Ubuntu, Fedora, Debian, CentOS, Redhat, etc. 5. Miscellaneous or derived from one of the above a. Nook b. Kindle c. Chromium d. RIM (Blackberry), Windows CE, Other proprietary systems b. What you need to do to keep it running efficiently and safely i. Keep it up to date 1. As hackers find vulnerabilities in an OS most manufacturers put out updates to “patch” these holes. 2. Most OS allow you to set up automatic updates (turn them on!) ii. Use the best version for your hardware. The newest OS is not always the best one for you. Many new OSs are not supported by older hardware and may not support older software iii. Keep an emergency restart/image if you have an OS that stops working. iv. Create and use a password to prevent unauthorized use of your device. This is especially important with portable devices that may easily be lost or stolen. v. Always keep your data files (documents, spreadsheets, etc.) backed up separately (on another device or different place) because if the OS stops functioning you may not have access to your data files and they may lost if the OS must be reinstalled. vi. Always backup your data files before installing a major OS update or firmware update to your device. c. Understand how to change system settings for your device 12 d. Understand general commands that your OS supports and how to efficiently execute them i. Cut, Copy & Paste ii. Drag and drop iii. File Copy, Moving and Deletion iv. Undelete deleted items v. Time & Date functions vi. Installing/Uninstalling software programs and/or apps vii. Know which software programs and/or apps are running and how to manage them 1. running Automatic startup with device poweron 2. Running in conjunction with other programs 3. Supplying personal information to others when you operate your device e. Attaching peripheral devices, such as printers, storage devices, etc. f. Understand and use OS optimization and/or protection software such as antivirus, disk cleaning, defragmentation, etc. g. Firmware updates i. Firmware updates can be used to provide new functionality from hardware. ii. Because the firmware code is usually stored in Read Only Memory (ROM) updates usually require overwriting original firmware iii. Often known as “flashing”, an incomplete or incompatible update can render the device nonfunctional (known as bricking) so great care should be used when updating firmware. iv. It often best left to trained users or professionals to update firmware. v. Some manufacturers have integrated firmware updates into the devices and are usually automated and require little or no user action. 13 III. Effective & Efficient Web Browsing a. .How Websites Work i. A Web site needs four things: 1. A registered domain or subdomain address (URL) 2. A connection to the Internet and recognition by at least one DNS 3. Web Server with Web Server Software (Apache, ISS, etc.) 4. Content ii. Web sites can be accessed by: 1. User entering the domain name into their browser’s address bar 2. User finds a link to a site through a Search Engine 3. User clicks on an HTML Link (see later section for more information on how links work) a. On a web page b. In an email c. Within an electronic document (PDF, Presentation, etc.) iii. Web Server/Software 1. Computers use a network, wired or wireless, to contact the web site’s server. 2. The host web server responds by sending an HTML page to the inquiring computer. 3. The inquiring computer uses its browser to “read” the HTML coded file and display a “web page” 4. The process is then repeated for each new page b. Understand what a browser is and how it works i. HTML ii. Cache iii. Cookies iv. Plugins v. Java and other scripting tools c. Selecting and Maintaining an Internet Browser i. Explore variety of available browsers 1. Mozilla FireFox 2. Google Chrome 3. Microsoft Internet Explorer (IE) 4. Apple Safari ii. Keep your browser uptodate. Out of date browsers are: 1. Susceptible to malicious software (viruses, spyware, trojans, etc.) 2. Cannot display newer pages properly 3. May not work with interactive (Web 2.0) sites 4. Are slower and may freeze often 5. Are unable to read latest version of HTML (5) iii. In addition to keeping your browser uptodate, it is imperative to also keep all browser plugins uptodate (Acrobat Reader, Shockwave, Flash, Java, etc.) d. Learn about different sections of browser screen: 14 i. Menu & Settings ii. Address Bar iii. Search Bar iv. Tabs v. Status Bar vi. Bookmarks/Favorites vii. Addon toolbars e. Tips for navigating i. Use Tabs features of most modern browsers 1. Allows you to have multiple web pages open simultaneously 2. Allows you easy switch between open pages 3. If you want to open a link on a page and do not want to close that page, instead open the link in a “new tab” by right clicking the link. 4. You can have multiple tabs open as your homepage when browser is started ii. Basic Controls iii. Right Click for context sensitive menus 1. Right clicking elements on web page will bring up a context sensitive menu 2. The menu you see when you right click can vary considerably depending on.. 3. Specific Browser being used 4. Version of the browser 5. Any AddOns/Extensions that have been installed 6. The web page you are 7. What you click on on the web page. 8. Keyboard shortcuts In addition to many of the usual keyboard shortcuts (such as copy CtrlC and paste CtrlV) there are special shortcuts specifically for use in your browser (see table below) 15 16 f. GleaningGathering/Repurposing/Different formatting of web page information i. Why the usual Copy/Paste routine often does not work as expected for web page content 1. Content displayed on a web page is can be very different than what most users are used to with other programs, such as word processing documents 2. It may be an image of words, not actual words 3. It usually contains HTML coding and HTML formatting information to properly arrange words and numbers on a page 4. It may be an embedded component, such as PDF, image, spreadsheet, video, flash, shockwave, etc. 5. It may be being generated “onthefly” by Java or other scripting ii. Even if the Copy part works normally the resulting Pasting is not what you expected or wanted g. Keeping track of sites you have visited (the good, the bad and the ugly) i. Good so you can return 1. Bookmarks/Favorites within the program 2. “Social” Bookmarking online bookmarks that follow you 3. Browsing History a. Know how to see browsing history b. Learn how to delete old history ii. OK so sites know your desired preferences 1. Your default location 2. Saved usernames and passwords (that you wanted saved iii. Not so good so sites can track you 1. Provide lots of targeted advertisements 2. Divert you to other sites 3. Gather information about you without you wanting them to a. Browsing habits b. Buying habits c. Social Networking habits d. Location e. Usernames and/or passwords 17 h. Avoiding Internet Dangers i. If it looks too be good to be true it probably is ii. Page Redirects iii. Know where you are going 1. Reading links before you click 2. Never type web addresses into your search bar instead of address bar 3. When it says you will be leaving a site, don’t answer yes unless you know where you are going iv. Turnon Phishing warnings on your browser v. Use a firewall i. Telltale signs of Internet fraud i. Phishing emails that look like they are official & warn of a problem with your account, bill, etc... 1. Then take you to fake sites where they can steal personal and financial information 2. Request for password or other personal information ii. Warning signs of Phishing & Fraud emails 1. 2. 3. 4. 5. 6. 7. Unsolicited offers If it looks too be good to be true it probably is Generic Salutations Misspelling or grammar errors Soundlike words Invalid or no Security Certificates Offshore or inaccurately described server locations 18 IV. Searching & Search Engines a. Use the best Search Engine for the Job i. Use more than one search engine Every search engine is different, and will give you different results. If you can't find what you're looking for quickly with the first search engine that you try, there's plenty more out there including specialized searches. For a very wide assortment of different Search Engines visit www.searchfindknow.com/100webserachingsites.html ii. Use Meta Searching One search engine is great, but a dozen search engines at one time is even better. iii. Don't even know where to start? Use Topic Indexes or Subject Directories to help you get started or with younger students More like an Encyclopedia, Table of Contents or Book Index. Some peoples personal searching preferences better match method of starting with Indexes and then drilling down to more specific subjects. b. Know how to use the Features of your chosen search site i. Visit the Help Page of the search engine for tips and tricks Know your favorite search engines inside and out. It's easy to skim the surface of your favorite search engines and only use the most prominent features; however, most search engines have a wide variety of advanced search options, tools, and services that are only available to those dedicated searchers that take the time to search them out. All of these options are for your benefit and can help make your searches more productive. ii. Learn how to set or change your preferences Search preferences can be set globally on many search engines (safesearch, limit number of results, chose default language, etc.) iii. Auto Complete can speed things up. There are multiple types of Auto Complete some within search engines and some in your browser, history, recent searches, etc. iv. Turn off personalized searching and/or use a search site such as DevilFinder which does not collect cookies. For example Google automatically pushes certain content at you that it assumes you will be interested in. This is based on: 1. Where you are (geographically) and 2. What you have searched for previously. For more information visit http://support.google.com/websearch/bin/answer.py?hl=en&answer=35892 19 v. Three tools that are intended for people maintaining websites can also be useful to searchers in identifying trends, alternative search terms, and research into key players and competitors in a sector. Google Trends for Websites http://trends.google.com/websites looks at search trends for individual websites or you can compare several websites. In addition it shows what people ’Also visited’ and ‘Also searched for’. Google Insights for Search http://www.google.com/insights/search/ advanced options for identifying search trends including countries and categories. vi. Use the country versions of Google for information that is country specific This will ensure that the country’s local content will be given priority, although it might be in the local language. Useful for companies and people who are based in or especially active in a particular country, or to research holiday destinations. Use Google followed by the standard ISO two letter country code, for example http://www.google.de/ for Google Germany or http://www.google.no/ for Google Norway. vii. Keep up on changes in the Web & Search Engine World. Learn how search engines work & about the search engine industry. Just as the Web itself, Search Engines come and go and change features. c. Use the Best Words in your search & know which words to avoid. i. Use unique, specific terms. Use specific words rather than generic categories. ii. iii. iv. v. vi. Whenever possible use "unique keys"/"golden words" Never search for single words! You probably will not find what you want and will very often be shocked by what you find! Use scientific or trade names for items not common name or nicknames Use your first couple of searches to find best words (one great place to find these words is Wikipedia). Carefully phrase your query The more specific your query is, the more success you're likely to have. After all, "why is the sky blue" is easier to understand than "sky blue question". For more information on how to craft a more specific query, read article titled "Looking for a Specific Phrase" at http://websearch.about.com/od/internetresearch/a/phrasesearch.htm. Don’t use common words and punctuation Common terms like “a” and “the” are called stop words and are usually ignored. Punctuation is also typically ignored. But there are exceptions. Common words and punctuation marks should be used when searching for a specific phrase inside quotes. There are cases when common words like “the” are significant. For instance, “Raven” and “The Raven” return entirely different results. Realize that some words are not searched for Known as "Stop Words" certain words are automatically excluded by search engines. These include words such as “the”, “is”, “at”, “which” and “on”. (This is similar to the rules you learned for sorting 20 book titles). Use +, " " or operators such as Verbatim will force inclusion of these words. vii. Drop the suffixes It’s usually best to enter the base word so that you don’t exclude relevant pages. For example, bird and not birds, walk and not walked. One exception is if you are looking for sites that focus on the act of walking, enter the whole term walking. viii. Use synonyms or alternative search terms. Be creative or use a thesaurus for ideas. Type thesaurus in the search box to find an online thesaurus d. CtrlF to find a word within the found page Depending on the specific browser you use the CtrlF box will open in a different area of the page e. Quickly & Effectively Review/Skim pages found. i. Just because an item is listed first does not mean it is the best resource. In fact, on many sites the first 5 to 10 entries are there because their owners paid the search engine company to put them there! ii. Learn how to quickly skim a search engine’s description of a page, in the search results Pay particular attention to the site address for clues. You can also install browser addons or extensions to get thumbnail views of the first page of each site found. iii. Evaluate more promising result pages found Use the Who, What, Why & When Criteria and Hierarchy of Source criteria. The "smell test" and other evaluation rubrics/schemes. f. Learn & Use the Query Syntax of Search Engines i. Although many search engines have added features to automatically help you get the right combination of words you may be searching for knowing and using Operators and other Syntax in your search give you the best results The easiest way to use many special search features without know the proper syntax is to use a site's "Advanced Search Page" ii. Learn simple operators: iii. The minus sign, will exclude words, " " will give exact phrases, + will force inclusion of "Stop Words" (see above) in your search and the ~ will include synonyms. AND will give you results that include both words but OR will give you results with either word. You can also use | in place of OR . iv. Most complex operators can really help you refine a search, but they may be harder to remember unless you use them often. A "cheat sheet" of operators is a quick way to start incorporating them into your searching https://docs.google.com/spreadsheet/pub?key=0An6huy2QVY59dDVaa2U3R0Vae WhKTHhSVi1yZWxQenc&output=html g. Learn how to Glean, Bookmark & Find pages again. 21 i. Understand how to use Bookmarks or Favorites Many "Social Bookmarking" online sites will allow you to have your bookmarks follow you to other computers or share bookmarks with friends or students. ii. Learn how to copy specific items, save text or data, etc. You may want to install Browser Addons/Extensions to allow right click sensitive copying menus. iii. Understand how to paste the information you have copied into your own documents. Copying and pasting tables into spreadsheets is a very good tool to understand, as it will allow you to analyze, sort, filter or do calculations on the information. iv. Understand how to use browser history to find pages you have already visited h. Use the Invisible Web i. Understand that many resources are not found by traditional search engines Invisible Web Directory: Many individuals and institutions have put together invisible Web directories, which you can use as a jumping off point to surf the Invisible Web. There are also specialized search tools for blogs, news, data, etc. i. Learn about URLs & Directory Structure i. Pay special attention to the addresses of sites especially the part following the "dot" which gives some indication of the type of site (.com, .gov, .edu, .net, etc.) ii. “Learn how to Climb Up & Down the Tree” j. Practice RWS (Recursive Web Searching™) Techniques to get more from sites (www.searchfindknow.com/rws.pdf) 22 23 24 V. File/Document Management a. What is a file? b. Document versus Application versus Operating System files i. Operating System Files The files that allow a computing device to work (see section on Operating Systems) ii. Application files, also known as Programs, Executables or Apps 1. Application/Program files are further divided into: a. Executables, the files that are “run” by the computer b. Installers are files that copy applications and all of their associated files onto the storage disk and integrate them with existing operating system c. Support files may... i. Directly support the Application ii. Integrate with OS iii. Keep user preferences, provide shortcut access, etc. iv. Interface with other programs v. Connect to outside devices, network, Internet etc vi. Support functions such as printing, backup, etc. vii. Provide import/export capability iii. Document Files 1. Contain user created content a. Normal b. Hidden Macros, Hidden Text or Cells 2. Contain information on formatting a. Fonts, text attributes, paragraph styles, etc. b. Backgrounds, borders, headers, footers, etc. c. Page Layout d. Printer Settings 3. Can contain historic information on the creation of the document a. Undo info, revision history, etc. b. File location on user device c. Time stamps d. Versions numbers e. User that created file f. Images can have GPS coordinates embedded telling where photo was taken 4. Contain data associating them with specific applications (this test the 25 computer which default program to use to open them c. Characteristics of all files i. ii. iii. iv. v. Name Date Size File Type (association with program type) Attributes (writable versus read only, etc) 1. Writable versus NonWritable a. Based on files properties b. Based on storage media properties/state c. Based on current or previous status d. Already open on the computer e. Locked files shared files already in use f. On network and opened by another user g. On local computer or network, currently in use by another program vi. Hidden versus Non hidden d. Creating a file e. Saving/deleting files i. Save versus Save As ii. Overwriting an existing file with same name f. Renaming a file g. Copying & Deleting a file h. Temporary files i. Editing a file attachment from an email j. Recovering a deleted file k. Storage i. Directories versus Files ii. File Hierarchy 1. Drive 2. Root Directory 3. Directory (Folder) 4. Subdirectory (Subfolder) 5. File iii. Files versus File Shortcuts iv. Temporary storage (working copies) v. Drive Letters 1. Nonremovable Storage 26 2. Hard Drive (Hard Disk) 3. Removable Storage Media l. Network Storage (Mapped Drives) i. Authentication/Log In ii. Privileges iii. Access iv. Read v. Create New (Write) vi. Change (Write to an existing file and save changes) vii. Local Access versus Internet Worldwide Access (Cloud Storage) m. File Transfer i. Copy to another device or removable media ii. Copy vs. Move iii. saving email attachments iv. Internet / Web Page a. File downloading b. File uploading v. PeertoPeer file sharing vi. Risks associated with file transfer 1. Lose 2. Interception (theft) 3. Corruption 4. accidental 5. vandalism 6. Malicious (attachment or embedding) 7. Viruses 8. Trojans 9. S.A.M. (Spyware, Adware & Malware) n. Safety in Document/File Storage i. Damaged Media 1. Physical 2. Magnetic 3. Electronic ii. Lost media iii. Theft and Privacy iv. Backing Up files 27 1. 2. 3. 4. Copies On same computer or storage media On separate computer or media, but located in same building Off site v. Backup Types 1. "Complete copy of all documents (don't forget application addons such as bookmarks/favorite, address books, etc.) 2. Incremental backup only files that have changed since last backup 3. Multiple version copies of the same document o. Recovering lost data i. Reversion to Previous Version(s) such as in Google Docs ii. Undelete 1. During copying or moving files use CtrlZ (undo) 2. Restore from Trash only effective if trash has not been emptied 3. Recover accidentally deleted files using special software required 4. Nefarious Recovery of Data 5. Even files that have been deleted can be recovered with special software p. Documents often contain hidden information i. History of changes ii. Information removed in editing process iii. Graphics files (Pictures, PDFs, etc.) can often be "undone" to reveal portions that have been purposely "blackedout" or covered. 28 VI. Using Productivity Tools a. General Layout i. Work Area the area where you enter and/or edit your text, images, etc. ii. Menus & Commands 1. Dropdown Text Menu (“file menu”) a. File Menu (Working with Documents) i. Create new blank document ii. Select from starting templates iii. Open an existing document iv. Save / SaveAs save your work v. Import/Export b. Page Setup c. Printing & Print Preview d. Properties e. User Settings f. Recently opened documents g. Exit program h. Edit Menu i. Copy/Paste ii. Undo/Redo iii. Find/Replace i. View j. Insert/Create k. Format l. Tools m. Data/Tables n. Help (usually also available with F1 key) 2. Toolbars/Icons/Buttons a. Icon Shortcuts i. Small pictures that let you carry out menu functions with a single click ii. Often Customizable iii. Which items appear iv. Based on tasking you are currently doing v. Based on user's preferences b. Location on Tool Bar c. Some toolbars can be "undocked" and floated in work area 29 iii. Status Bar (usually at bottom, gives status of what your are doing) 1. Contains information about... a. The document you are working on b. Number of total pages, current page number, location document c. Worksheets d. Current Font, styles, etc. e. the status of keyboard (insert versus overwrite, etc. b. Context Specific Menus (“rightclick mouse menus”) i. Usually brought up by a single right clicking of the mouse on an item or space in the document (accessed differently in Macintosh OS) ii. Menu items listed depend on what you can do to the item you clicked on iii. To select menu item single left click of mouse c. Keyboard, Mouse and Selecting/Highlighting Shortcuts i. Highlighting/Selecting tricks 1. Double click a word to highlight 2. Highlight first part of selection using mouse, then press shift and use the up and down arrows or up and down keys to highlight the remainder of desired selection 3. Selecting multiple items from a list 4. To select items that are together in a list click on first item, press and hold Shift key, then click on last item and then release Shift key 5. To select items spread throughout a list click on first item, press and hold Ctrl key, then click on each desired and then release Shift key d. Keyboard Shortcuts If you do not know how to copy/paste without a mouse, you are not computer literate. Sorry! Every operating system has some universal keyboard commands, and while knowing them won’t add 30 minutes back into your day, it will take a lot of the “friction” out of using a computer. Learning these commands is more a matter of routine than anything else; a short tutorial done once a day for a week will probably be enough to put you in the habit, and it will make you a happier user. i. A combination of keys being pressed at same time (usually Alt or Crtl keys plus one letter key) ii. Many keyboard shortcuts are the same or very similar in most programs iii. The two most important Keyboard Shortcuts are: 1. F1 key for Help. 2. CtrlZ keys to Undo iv. Commonly used Shortcuts include: (see chart of Keyboard Shortcuts below) v. Variety of left, right, single and double mouse clicks can provide a different actions (see Context Specific Menus, above, for one example.) 30 Keyboard Shortcuts Keyboard Shortcuts 31 VII. Spreadsheets & Databases a. Components of Spreadsheet Program i. Menu/Toolbars ii. Data & Formula Entry/Editing Bar iii. Functions Bar or Button iv. Worksheet Grid 1. Cells 2. Rows & Columns 3. Ranges v. Sheet Tabs – at the bottom of the sheet and tell the user which sheet you are currently using. For example: Sheet 1, Sheet 3, or Vacation Budget, Tools Inventory (you can change the names to something more meaningful) b. Working with Cells, Rows, Columns, Ranges and Worksheets i. Naming conventions 1. Cell References a. Relative/Default Cell References (A9) will change if you add rows or columns, copy or paste formulas, drag & drop or use autocomplete b. Absolute References ($A$9) will remain the same even if copied & pasted, move or autocomplete is used c. Semi Absolute References one part of cell name is absolute while the other is relative ($A9) 2. Range References a. By cell names (A9:D24) indicate the first cell in upper left corner and last cell in lower right corner b. Ranges can also be given "text" names such as table, students, gradescale, etc. 3. Worksheets References a. References to cells on another worksheet appear with a "!" in the name (i.e. Sheet3!B2) ii. Adding, Deleting and Moving Cells, Rows, Columns and Worksheets iii. Cell “Handles” for Moving or Copying (extending range iv. Resizing Columns/Rows 1. Using mouse, place cursor at the border of a column or row label and cursor will change shape 2. To manually adjust hold down button & slide mouse left or right 3. To automatically resize to fit the widest item in a column double click c. Data and Formula Entry i. Adding data to cells 32 1. Click in a cell & type in data. Press the Enter key or an arrow key to complete. Pressing the ESC key cancels input 2. To enter numbers or symbols such as =, /, +, * or @ as text instead of as a number value or formula start with the apostrophe symbol ( ' ) then type in the desired text ii. Simple formulas 1. Choose cell you would like formula (it does not have to be adjacent to your data cells 2. Click Formula Bar to edit entry or click in cell and retype corrected data iii. Functions are premade formulas provided by spreadsheet to speed calculations 1. Click Function button 2. Choose function 3. Enter requested information d. Copying Pasting and/or Moving Data and/or Formulas i. Simple copy & paste 1. Highlight item then use CtrlC or select "Edit...copy" 2. Can be used for single cells or entire ranges 3. Choose location you want and use CtrlV or Edit...paste ii. Drag & Drop from one cell to another iii. Paste Special 1. From within spreadsheet 2. From outside sources (web pages, word processing, etc .) 3. Values Pastes the results of Formulas or Functions as opposed to simple paste which would paste the actual formula or function. 4. Formats Fonts, Attributes, Shading, etc. 5. Column Widths 6. Transpose turns a column of data into a row & visaversa iv. Auto Complete 1. Used to extend a series of numbers, dates, etc. 2. Highlight cells at the beginning of a series. Move cursor to bottom right corner & it will change shape. Click & hold mouse button while scrolling down 3. Can also "copy down" a formula or cell format 4. Can be used vertically or horizontally 33 e. Formatting Numbers i. Number Type Do not manually format numbers instead use Num. Format 1. Currency provides "$" 2. Special brackets & dashes for Phone, Social Security #s & Zip Codes 3. Percentage accounts automatically for the x100 factor 4. Fraction converts & rounds decimals to fractions ii. Formatting Alignment 1. Text Alignment Horizontal & Vertical Position in a cell & Amount of Indent 2. Vertical or Angled Text Orientation 3. Text Control 4. Wrap Text more than row per cell f. Formatting Cells i. Formatting Borders, Backgrounds & More ii. Line Styles Chooser and Preset Borders iii. Custom Borders toggle desired lines on or off by clicking iv. Custom Presets v. Patterns Tab Includes colors & background patterns vi. Merge cells vii. Protection Tab allows you to lock and/or hide cells g. Conditional Formatting i. In conditional formatting the characteristics of cells and their contents change based on a specified criteria. Examples include: 1. Cell Value Is... 2. 3. 4. 5. 6. Equal to Not Equal to Between Greater or Less Than Formula results specified return logical value of TRUE (1) or FALSE (0). h. Formulas i. Basic Math Operations ii. Addition + iii. Subtraction iv. Multiplication * v. Division / vi. Multiple cells and math operations can be used in a formula 1. Order of Operations follows normal order of mathematics operation 2. Parentheses are used to alter order of operations 34 i. Functions are a special "shorthand" version of formulas or operations i. Formulas and Functions can be combined. ii. Multiple Functions can be combined iii. Common Functions include: SUM, AVERAGE, MAX, COUNT, CONCATENATION, VLOOKUP, IF Statement and COUNTIF j. Entering Functions i. Functions can be manually entered by typing an = sign then the function name ii. Functions can be accessed via the = sign or fx on the Formula Bar, then using the dropdown box to select the desired function iii. Functions "More Functions" 1. Listed by Category 2. Function Names 3. Short Description iv. Help lists general info about the function selected v. As you click on each argument, help specific to that argument will appear. k. Combining or Separating Data (especially text) i. Concatenation combining information ii. Text to Columns (Parsing) 1. Allows you to take multiple pieces of data & separate it into adjoining cells in row 2. To determine where to "break" a cell's string of data the SS uses one of two methods: a. Fixed Length (i.e. a break at every 10th character in the string) b. Delimiting Characters i. Most common delimiting characters: ii. Comma (.csv) iii. Tab (.txt) iv. Semicolon v. Space vi. Many SS provide a "wizard" to walk you through Parsing 3. Many "tables" of data from web pages require Parsing to be useful in SS 4. Best rule avoid combining more than one piece of information in each cell, but if you must, try to include a Delimiting character 5. Alternatively, functions LEFT, MID and/or RIGHT functions can be used to return only the first, middle or last part of the string of data in a cell iii. Extraction Left, Right or Mid iv. VLookup finds data from list using a specific piece of data in cell l. Sorting & Filtering 35 i. Sorting (Ordering) 1. Sorting is used to arrange data in a specified order based on the beginning character(s) of one or more columns of cells 2. You can sort all data on a worksheet or any subset of data in an area of contiguous cells. 3. You select the data to be sorted by highlighting all the cells 4. If your cells contain a header row, check the appropriate radio button in sorting dialog box 5. It is very important that you include all the columns for a given row of data or they will become "detached" and out of order (the key combination Ctrl* will select all the cells in a contiguous table) ii. Filtering (Separating/Finding) displays only given set of rows (cells) based on a specified criteria. There are two methods of filtering 1. Auto Filtering a. Uses a header row or column labels b. It can be toggled on or off from menu (DATA) c. Small dropdown arrow lets you choose filtering criteria for one or more columns d. Only rows with matching data are displayed, all other rows are hidden. 2. Advanced Filtering uses three or more extra rows above your data where filtering criteria is entered. m. Charts & Graphs i. Charts & Graphs can graphically display the relationships between various aspects of your data ii. Make it easier to spot trends or variations iii. Creating a Graph 1. Select the data you want to display in your chart. Be sure to include the relevant column and row labels 2. Click icon to start the Chart "wizard" 3. 4. 5. 6. Select the type of chart you want (pie, bar, etc.) Select how you want data plotted (based on rows or columns) Add titles for chart, Category (X axis) & Value (Y axis) Once the chart is created, you can tweak various aspects (colors, fonts, sizing, etc.) by right click on that element 36 n. Printing Spreadsheets i. Define area to be printed by highlighting the desired range; then from the menu go to File...Print Area..Set Print Area. ii. Change how SS prints on your page by going to File...Page Setup and/or use the File...Print Preview iii. Page Tab Change paper size, orientation, scaling iv. Header Tab Setup items to print in header or footer of each page v. Sheet Tab Set print area, set label row(s) or column(s) to repeat on each printed page vi. You can also use many of the AutoFormat function and Styles to assist in preparing your SS for printing (both are found under Formatting menu) o. Page & Cell Protection i. Locking & Unlocking Cells ii. Protecting and Unprotecting Worksheets p. Import / Exporting i. Importing 1. By opening a spreadsheet file created with another program 2. By copying & pasting from another open spreadsheet 3. By copying & pasting from a word processing or other type of document 4. Gleaning See section below ii. Exporting 1. By saving a spreadsheet to another spreadsheet program's file format 2. By copying & pasting from an open spreadsheet into word processing or other type of document 3. By exporting as one of the "Common Data File Formats" that most spreadsheet and many other non spreadsheet programs, such as Databases, can read a. Text file with fixed width formatting b. Text file with delimiting character i. CSV uses commas ii. Text uses tabs c. Database formats 37 iii. Gleaning taking information from a web page, PDF or other document and converting into a spreadsheet 1. Discuss potential problems of converting 2. Use necessary techniques including, but not limited to a. Copying b. Pasting Special c. Transposing d. Text to Columns e. Concatenation f. Functions q. Macros Allow advanced functions and repetitive operations to be automated (see below) i. Define Macro ii. Create a simple macro iii. Record a macro iv. Run the macro to check its operation v. Edit an existing macro r. Window View i. Freeze Panes Allows you to scroll up/down or right/left through SS while the column and/or row labels remain in place ii. Set by clicking in a cell at point of the first column or row you want to scroll (to right of column(s) or below row(s) you want frozen) iii. Click Window ... Freeze iv. Split Frames creates two frames where you can focus on two different areas of the same SS simultaneously 38 s. Databases (dB) i. Types There are several types of databases that can be used in realworld scenarios. The most common are 1. Flatfile databases are generally plain text files that can be used by local applications to store data. 2. Relational database are databases with related tables of information. Each table has a number of columns or attributes and a set of records or rows. Relational databases are more popular because of their scalability, performance and ease of use. t. Components of Databases i. Database Management System (DBMS) ii. Collection of structured data iii. Tables for organizing data iv. Schema for defining table relationships v. Queries vi. Reports vii. Links to other programs, that provide or use data from dB (Frontend) u. Data Structure is based on records, fields and files i. Record is a group of information (fields) based on a single item or object in dB ii. Field is a named component of each aspect of a record. Most records have multiple fields iii. Files are collections of records v. Field Characteristics i. Type of information being stored 1. Text (also know as Character, Alpha, Alpha Numeric or String) 2. Number (aka Numeric) 3. Record Number (aka AutoNumber) 4. Date (Date/Time, Time or Timestamp) 5. Logical (aka Boolean True/False, Yes/No, On/Off, etc.) 6. Currency 7. Memo 8. Binary ii. Special Types of information storage 1. Calculated (Autoincrement) 2. OLE Object (document, spreadsheet, picture, audio, video, etc.) 3. Hyperlink 4. Key (dB Key, GUID, UUID, Lookup Wizard) 39 iii. Field Length (number of characters) iv. Validation 1. Required versus Optional 2. Characters (information) allowed in specific fields 3. Duplicate Values Rules Allowed versus Not Allowed v. Locks vi. Hidden versus Visible w. Database Table & Schema i. A table is responsible for storing data in the database. ii. Database tables consist of rows and columns. iii. A row contains each record in the table iv. A column is responsible for defining the type of data that goes into each cell at the intersection with a row. v. In a relational database there is a schema which defines the tables, the fields in each table, and the relationships between fields and tables. x. Queries i. A query is a question to the database, such as: “What is the zip code for a specific town in a specific state?” “List all history teachers that also teach government”, “List all male students with first name beginning with “J”. etc.” The answers to each of these queries will be a relation. ii. Databases have their own programing language and syntax for posing a query. One example is the very popular SQL (Structured Query Language). iii. A query is usually made up with three components: 1. Select list (aka SELECT) 2. Range or Data Tables being searched (aka FROM) 3. Filtering Criteria (aka WHERE) iv. Some DBMS also have special wizards or tools to more easily create queries without in depth understanding of query syntax v. Queries via a Frontend 1. Queries can also be generated on a website and then transferred to the dB via Frontend program such as PHP 2. Queries can also be generated via other software programs vi. The results of a query are called a record set and can be expressed as a Report, Form (cross tab), Chart or HTML Table. 40 y. Databases versus Spreadsheets i. Spreadsheet Pros 1. Are usually much quicker and easier to setup and use. 2. Are usually much quicker and easier at solving calculations 3. Have a wider range of functions easily accessed by user ii. Database Pros 1. Allow much larger sets of data 2. Can keep the data isolated from the end users, making multiperson use safer as data cannot be compromised. A spreadsheet is edited directly by people while a database is accessed by applications that enter and modify data. 3. Are usually much faster at manipulating large amounts of data 4. Greater latitude in defining relationships between multiple sets of data 5. Allow easier and faster bulk updates 6. Provide more powerful tools for data entry a. Validation b. Autoincrement c. Time Stamps d. ID of person entering data e. Autolookup of field information based on previous field entry (i.e. entering zip code may autofill of city and state fields) z. Data interchange between Spreadsheets and Databases i. Import/Export ii. Automated connectivity with tools such as ODBC (Open DataBase Connectivity) iii. Use of API (Application Programming Interface), a protocol intended to be used as aa. an interface by software components to communicate. Specialized Spreadsheets & Databases i. Online Forms 1. Google Forms https://docs.google.com/a/mogadore.net/document/d/15i1AamaA_47cI9Wc 9Rw_ATr7h6yM0lpxofJImgzI/edit?hl=en&forcehl=1 2. Web Script based a. MySQL/PHP based b. e Commerce sites c. Commercial packages 41 Keyboard Shortcuts for Excel & Most Spreadsheets Keys Action Enter Move to next cell down and/or complete function Tab Move to next cell to right ESC Stops data enter or change in a cell and reverts to original contents Arrows Move up, down, right or left Ctrl+Z Undo Ctrl+A Select All Ctrl+* Select all cells in a contiguous rectangle Ctrl+B Bold Ctrl+D Fill Down Ctrl+F Find Ctrl+G Goto Ctrl+K Insert Hyperlink Ctrl+N New Workbook Ctrl+S Save Ctrl W Close Ctrl+: Insert Current Time Ctrl+; Insert Current Date Ctrl+1 Format cells dialog box F4 Repeat last action F7 Spell check F9 Recalculate all workbooks Ctrl + Shift +F3 Shift+F10 VIII. Create name by using names of row and column labels Display shortcut menu Word Processing 42 a. Create a variety of documents including the following types: i. Short story ii. Newsletter iii. Menu or phone list iv. Letter v. Envelope vi. Labels vii. Brochure b. Your Word Processor is not a typewriter i. Many previous users of typewriters continue to carry for principals designed for typewriting. ii. Even people that have never used a typewriter continue to follow these principles, because that is what they have been erroneously taught. iii. Many of the rules of typewriting were actually functions of the limitations of the typewriter. For example typewriters had only one font and each character typed took up the same amount of horizontal space on a page. c. Line Wrap i. ii. Do not press the Return Key at end of each line. Allow automatic line wrap. Do not use the Enter or Return Key at end of line unless starting a new paragraph d. Double Spacing i. ii. Do not press the Return Key at end of each line twice Change Paragraph Style or other similar setting, change setting for "Line Spacing" to Double. Allow automatic line wrap. Do not use Enter or Return Key at end of line unless you are starting a new paragraph. e. Numbered List or Outline i. ii. Do not type a digit, then a period and then a space; repeating for each line Change Text Style Use Numbered List Style or desired Outline Style. Both allow easy rearrangement, insertion and/or sorting of all lines of text and your numbering will be automatic f. Multicolumn Lists (such menus, price lists, etc.) i. Do not use combination of Tabs and/or Spaces for horizontal alignment and Return key for vertical alignment. ii. Do not use column function (it is for the type of columns found in newspapers or books where text begins in one column and at the column wraps into next column). 43 iii. Use Table function in your word processing program. 1. You can choose to print borders or use no borders and people will not know how you got everything placed just right! 2. By using tables you can easily change font size, entered text or number of columns or rows. g. Placing Text a specific point in document (outside the body of the text. i. Do not use combination of Tabs and/or Spaces for horizontal alignment and Return key for vertical alignment ii. h. Depending on your specific needs use Text Box and/or Table function. Punctuation i. Do not use 2 spaces following periods or question marks. Two spaces were needed with typewriter to create the special offset look of sentence break because each character typed took up the same amount of horizontal space on a page. ii. Only one space is necessary following periods or question marks. The proportional text automatically offsets the punctuation marks so no second space is necessary i. Emphasis or special characters i. Do not use Underling (type row of _ _ _under text) to emphasize text or replace italics. This was done on typewriter because italics or special characters were not possible. ii. Use Text Attributes or Styles to convey special meanings: 1. 2. 3. Bold or Underline to emphasize text Italics for italicized text (such as book titles). Sub or Supra Script, for formulas or chemical equations. (For complicated math formulas you may want to use “equation editor” feature.) 4. 5. Strikethru, etc.. use specific built in text functions. Special Characters Use "Keycaps" Characters or Altxxx for number code of special characters. j. Inserting and Editing Objects into your document i. ii. Header/Footers Pictures 1. 2. 3. Clipart From your own file From web iii. Text iv. Page Numbers v. Symbols and special characters vi. Equation editor vii. Word Art viii. Documents, spreadsheets and other program outputs 44 k. Formatting i. ii. iii. iv. v. Text Styles Alignment Paragraph Styles Line Spacing List Styles 1. 2. 3. l. Bullets Numbered Lists Outlining Learn to use the extra features i. Spell Checker 1. 2. 3. Autocorrection & Autotext Glossary Expansion Customizing the dictionary ii. Find and Replace not only words but formatting iii. Adding/Editing Hyperlinks iv. Table of Contents v. Themes, Backgrounds, Borders, etc. vi. Booklet Creation vii. Word and Letter Count m. Methods of distribution i. Printing ii. Sharing electronically for collaboration iii. Booklet printing iv. PDF creation v. Saved file formats 1. Text 2. Rich Text Format (.rtf.) a nearly universal word processing format 3. Proprietary (.doc, .docx, .wps, etc) a. Compatibility b. Conversion vi. Publishing to web 1. Converting to HTML 2. Embedding in web page 3. As email attachments (see section “email, Internet & Social Networking Etiquette and Safety) 45 IX. Copyright, Citing Sources and Plagiarism a. See Resources section for more on teaching about copyright & plagiarism b. What is Plagiarism? c. Not always “Black & White” often extremely “Gray & Fuzzy” i. Definitions of Plagiarize 1. 1. From the Free Dictionary ("The Free Dictionary." The Free Dictionary. Farlex, Inc., Web. 1 Jan 2010. <http://www.tfd.com/plagiarize>.) a. To use and pass off (the ideas or writings of another) as one's own. b. To appropriate for use as one's own passages or ideas from (another). c. To put forth as original to oneself the ideas or words of another. 2. From the MerriamWebster Online Dictionary, to "plagiarize" means a. to steal and pass off (the ideas or words of another) as one's own b. to use (another's production) without crediting the source c. to commit literary theft d. to present as new and original an idea or product derived from an existing source. d. Types of Plagiarism Anyone who has written or graded a paper knows that plagiarism is not always a black and white issue. The boundary between plagiarism and research is often unclear. Learning to recognize the various forms of plagiarism, especially the more ambiguous ones, is an important step towards effective prevention. Many people think of plagiarism as copying another's work, or borrowing someone else's original ideas. But terms like "copying" and "borrowing" can disguise the seriousness of the offense (list below taken partially from http://plagiarism.org/plagiarism101/typesofplagiarism): i. Sources Not Cited 1. The Ghost Writer or Clone The writer turns in another's work, wordforword, as his or her own. 2. The Photocopy or “CtrlC” The writer copies significant portions of text straight from a single source, without alteration. 3. The Potluck Paper or Remix The writer tries to disguise plagiarism by copying from several different sources, tweaking sentences to make them fit together while retaining most of the original phrasing. 4. The Poor Disguise or FindReplace Although the writer has retained the essential content of the source, he or she has altered the paper's appearance slightly by changing key words and phrases. 5. The Labor of Laziness or Mashup The writer takes the time to paraphrase most of the paper from other sources and make it all fit together, instead of spending the same effort on original work. 6. The SelfStealer or Recycler The writer borrows generously from his or her previous work, violating policies concerning the expectation of originality adopted by most academic institutions 46 ii. Sources Cited (But Still Plagiarized) 1. The Forgotten Footnote The writer mentions an author's name for a source, but neglects to include specific information on the location of the material referenced. This often masks other forms of plagiarism by obscuring source locations 2. The Misinformer or “404 Error” The writer provides inaccurate information regarding the sources, making it impossible to find them. 3. The Too Perfect Paraphrase or ReTweet The writer properly cites a source, but neglects to put in quotation marks text that has been copied wordforword, or close to it. Although attributing the basic ideas to the source, the writer is falsely claiming original presentation and interpretation of the information. 4. The Resourceful Citer or Aggregator The writer properly cites all sources, paraphrasing and using quotations appropriately. The catch? The paper contains almost no original work! It is sometimes difficult to spot this form of plagiarism because it looks like any other well researched document. 5. The Perfect Crime or Hybrid Well, we all know it doesn't exist. In this case, the writer properly quotes and cites sources in some places, but goes on to paraphrase other arguments from those sources without citation. This way, the writer tries to pass off the paraphrased material as his or her own analysis of the cited material. e. Plagiarism & The Internet i. The Internet makes it both easier to commit and catch plagiarism 1. 2. Has given students mixed messages on what is property Citation of Internet resources is still "murky" a. b. c. Confusing Multiple ways with minimal standardization Often does not take into account the very nature of information on the Internet i. ii. iii. iv. Different writing style Fast and ever changing Multiple authors Hard to determine qualifications of presenters of information and validity of information presented, etc. v. Takes very little money to "publish" which can contribute to questionable authority of authors vi. Often more "visual" than "textual" Videos, Sounds, Speech, vii. Animation's, Hyperlinks etc. 3. f. Copyright Law i. What is necessary to copyright an item 47 ii. iii. iv. v. How long is the copyright in effect What can and cannot be copyrighted Differences between trademark, patent and copyright What is fair use 48 X. Presentations a. Types of Presentations i. Passive Learner 1. 2. 3. 4. 5. ii. Online Web 2.0 Tool (Prezi, etc) Video/Animations Podcast Interactive Whiteboard Active Learner 1. 2. 3. 4. 5. b. Slide Show (PowerPoint, Google Docs, etc) Nonlinear (use of hyperlinked pages, based on user responses, etc.) Apps Online Simulations Virtual Reality, role playing or other gaming Interactive Whiteboard Slideshows i. ii. iii. iv. Do research Collect information Create new presentation from scratch or template Create Slides with 1. Variety of new slides with text, photos, charts, etc. 2. Embedded content web links, video, audio, etc. v. Editing 1. Edit, rearrange and tweak text and information 2. Format slides, fonts, transitions, etc. vi. Present show vii. Create sharable copies of show 1. “PackandGo” 2. HTML c. Create a presentation using an online Web 2.0 tools (Prezi, etc) 49 d. Create a video presentation i. Outline project ii. Write and edit 1. Storyboard or outline 2. Script iii. Shoot planned video clips iv. Edit shot video clips into “chapters” v. Add/Edit 1. Sound a. Dialogue b. Voice over narration c. Sound effects 2. Captioning a. Titles b. Subtitles c. Credits vi. Finalize video 1. Combine chapters 2. Create final recording 3. Burn to DVD or upload to video server or a web site e. Create Podcast i. Do research ii. Write and edit 1. Outline 2. Script iii. Record and edit script iv. Add sound effects, music, etc. v. Edit final recording vi. Post to web f. Media Literacy g. Creation & Editing of Original Media i. Still Photography ii. Basic of Photography 1. Composition 2. Lighting 3. Shutter Speed 50 4. ISO 5. Aperture iii. Video Recording iv. Audio Recording 1. Spoken Word 2. Recorded Music v. Drawing/Illustration 51 XI. email, Internet & Social Networking Etiquette and Safety a. Know Who Are You Sending It To and What You are Actually Sending i. Be sure you know who are really sending mail to 1. Know how of following work and which to use when a. to: to a specific recipient b. cc: to more than one recipient, but all recipients are aware of who else the message was addressed to (all addresses appears) c. bcc: to more than one recipient, but all recipients are unaware of who else the message was addressed to (only recipients address appears) 2. Do not share other’s email addresses with your sent emails by using bcc: to prevent address harvesting 3. Reply vs. Reply All 4. Double check message & address before hitting send. There is no way to get it back! a. Misspellings of user/address b. Similar looking addressees c. Other addresses included in cc: & bcc: 5. Reply to unsolicited beware of Phishing scheme & Spoofed addresses. ii. Be sure you really know what you are sending 1. email Header information Domains, servers, timestamp, smps, etc. 2. Secondary information in attached documents a. Spreadsheets i. Additional worksheets ii. Hidden cells of a spreadsheet iii. Links to other docs b. Embed information in documents & graphics i. Undo information ii. Redacted PDF iii. Masked graphics 52 3. Bad Taste / Annoying / Complicating a. Out of Office Replies b. Fancy formatting of email c. “Novels instead of notes” d. Using an attachment when the information could have easily been pasted directly into the body of the email e. Proprietary attachments (i.e. Office 2007 or 2010 .docx, Works .wps, Visio diagrams, AutoCad drawings, etc.) b. If you receive an email to “correct an error with your account” or similar problem i. Do not click on included links, instead go to your browser and go to the bank, PayPal or other companies web site by typing in address. Although the link in the email may look like it will take you to right place closer evaluation of the actual hyperlinked address may be very different! ii. Never give responds to an unsolicited email asking for passwords, user names, personal, bank or other sensitive information. c. Never agree to meet, someone you do not know, inperson based solely on email or web invitation d. Offers of FREE money, securities or other items are almost always scams (often referred to as “Nigerian Bank” scams) e. Never install unknown software from an email link. f. Digital Literacy and Citizenship Classroom Curriculum Scope & Sequence http://www.commonsensemedia.org/educators/scopeandsequence 53 Finding, Choosing, Using and/or Developing Software Apps, Online Tools & Simulations XII. a. Types of Programs and Apps based on cost i. Commercial 1. 2. 3. 4. Full paid version Subscription Volume Licensing Upgrades a. b. 5. 6. 7. Same manufacturer Competitive upgrades from other manufacturers Discounted versions, such as Academic Light Versions Viewer Only versions does not let you create new work only allows you to open documents previously created with the software. 8. Bundled with hardware 9. Demos ii. OpenSource 1. Both software and source code are made available for free 2. End users are not only allowed to use the software, but can also use iii. iv. v. modified source code versions and often individual components of source code 3. OpenSource provider may place some restrictions on usE. These may include not for commercial use, not for resale, no deconstruction of source code to use only specific components, etc. Free although OpenSource software is free, Free software may or may not be Open Source. Often the source code is not made available. Shareware software can be tried and if users wants to continue to use it or wants access to all features they must register and pay for software Adware software is free but end user is show periodic ads within software. These ads provide revenue to software company. A similar example is seen in software with the Amazon Kindle, where user must pay additional fee to have OS be ad free. Donationware software is free, but owner will accept donations from users vi. vii. Nagware Software that keeps reminding the user that they want to choose to pay for the software and if they continue to use free version they will continue to get interruptions in form of “nags” or timeouts. 54 b. Types of Programs and Apps based on availability i. Does not require installation, it is available as an online Internet application ii. Comes preinstalled on most computers as part of the operating system. Including ability to create a new file, rename a file, cut/copy/paste, rudimentary calculator, rudimentary word processing, ability to read or play a CD/DVD, etc. iii. Requires installation on a specific type of computer with a specific operating system iv. Requires installation on a specific type of computer with a specific version number of a specific operating system v. Requires installation, but works almost universally on most computers with a variety of operating systems supported vi. Is installed on a device that is not a dedicated computer such as a smartphone, ereader or tablet. c. Web 2.0 Online Tool Definition (do not require installation, are available as online Internet applications) i. Term used to describe web sites that use technology beyond the static pages of earlier web sites. ii. A Web 2.0 site may allow users to interact and collaborate with each other in a social media dialogue as creators of usergenerated content in a virtual community, in contrast to websites where people are limited to the passive viewing of content. iii. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing sites, hosted services, online tools/applications, etc. iv. Cloud based services, such as Google Docs, Microsoft 360, Carbonite Backup Storage, etc. d. Sample Categories of Web 2.0 Online Tools i. Online Calculators used for wide variety of functions including but not limited to:: 1. Mathematics, Geometry, Trigonometry a. Standard math functions addition, subtraction, multiplication, division, square root, exponents, fractions, etc. b. Scientific Notation c. d. e. f. g. Graphing calculators Triangle solving angles, length of sides, etc. Circles solving area, circumference, radius, etc. Area/Content perimeter, area, volume, etc. Time seconds, minutes, hours, days, years, multiple dates, etc 2. Conversion (Units) a. Temperature Celsius <> Fahrenheit 55 b. Currency exchange rates c. Measurement i. Metric<> Imperial (aka Standard or English) ii. Volumes teaspoon, tablespoon, cups ,quarts, etc. iii. Feet, yards, inches, miles, etc. d. Fractions <> Decimals 3. Speciality a. Finance interest, loans, mortgages, amortization, taxes, etc. b. Calories, body mass index, etc. c. Mileage d. Holiday dates e. Solar sun angle on specific days at specific locations ii. Online displays of information based on user input or selection of specific criteria 1. Graphs & Charts 2. Timelines 3. Calendars 4. Travel Maps and Directions 5. Demographic Maps showing conditions or information about specific states, countries, etc. (election results, languages spoken, average age of residents, minerals resources, products produced, etc.) 6. Astronomy Sky Charts 7. Individually numbered available locations/seats on a plane, in a stadium or theater, cruise ship, etc. iii. Commerce 1. 2. 3. 4. 5. 6. Buying or Selling of goods, services or information. Acquiring Apps, Music or other data Online Banking Payment of fees (car and other vehicle licensing, user permits, etc.) Online Income Tax Preparation Online Voter registration iv. Communications/Information/Data 1. Surveys 2. Blogs 3. Social Media 4. File Sharing e. Simulations & Modeling Programs i. Can be standard installed software but most are now web based 56 ii. Can include one or more of the following functions 1. Provide visual display of a process 2. Allow manipulation of items by user 3. Allow experimentation and/or observation by user 4. Allow user to take on a role or to be present in a virtual location and be represented by an avatar 5. Safely demonstrate principles and functions of processes and/or items that are either too large, dangerous, involve large expenses, require travel to remote destination, require different time periods, etc. iii. A small sampling of Simulations and Modeling examples might include: 1. Simple Machines allows manipulating items that utilize concepts of the lever, wheel, pulley, inclined plane, wedge and/or screw 2. Flight simulator allows user to experience flying a plane 3. Online chemistry set, that allows combination of different elements 4. Building and managing a model city, railroad, zoo, etc. 5. Visiting a. Deep ocean b. Dinosaur in their natural environment c. An ancient civilization d. Other planets in solar system 6. Constructing and/or testing performance, strength and/or other attributes of a. Building b. Bridge c. Automobile d. Airplane or Spacecraft 57 f. Accessibility two types: i. Making sure that design of software and web sites are accessible by all users including those with special needs. Examples include but are not limited to: 1. Ability to use audio reading software 2. Design of alternative methods for entering data or interacting with computer 3. See the U.S. Department of Justice’s “Technology and People with Disabilities: The Current State of Federal Accessibility” for more information. ii. Special Software and/or special program functions designed specifically to assist user with special needs. Examples include but are not limited to: 1. Texttospeech 2. SpeechtoText 3. Annotation software 4. Use of existing software program’s special features to enhance usability for user requiring accommodations: a. Changing of font size, style and/or color b. Color highlighting tools c. Keyboard Shortcuts g. Developing and/or programing software, apps, microcontolors, microcomputing devices and/or robotics i. Understand basics of how a software program is written and functions ii. Create an App 1. Create a prototype or pseudo App utilizing diagramming software, spreadsheet or other tools 2. Convert a Java or other web script into an App 3. Write an App in a programing language iii. Utilize a microcomputer, microcontroller or embedded computing device (Arduino, Basic Stamp, PIC, etc.) 1. Program functions or use prebuilt program to operate 2. Design or use a predesigned hardware interface to utilize the device to perform a task. iv. Robotics 1. 2. 3. 4. Understand concept of robotics Program a prebuilt robotic device to perform an action Build a robotic device utilize available modules Design your own robotic device 58 h. Online Testing (see “ComputerBased Assessment: "Intermediate Constraint" Questions and Tasks for Technology Platforms” for more information) i. Understand concept of “closed/secured” browser ii. Navigation between screens iii. Use of online calculators iv. Viewing Presentation 1. Control Start, Stop, Pause, Rewind, etc. 2. Go to “Full Screen” view and return to normal view v. “Answering” questions 1. Selection of Multiple Choice a. “Radio buttons” for selecting one item only b. “Checkboxes” for selecting multiple choices for one questions 2. Selection/ Identification a. Click on an object b. “Lasso” multiple items c. ShiftClick first and last item (in adjacent items) d. CtrlClick to select non adjacent items 3. Reordering/ Rearrangement a. Arranging objects into specific positions by dragging with mouse b. Numbering or lettering 4. Substitution/ Correction 5. Completion a. Typing in a blank space b. Typing in a text box 6. Construction a. Moving “building blocks” into a desired shape/pattern b. Drawing lines/objects to create shape/pattern c. Copy/Paste “building blocks” from one place to another 7. Creation a. Table of information b. “Spreadsheet” c. Outline d. Brochure e. Presentation 59 Resources 1. Digital Literacy and Citizenship Classroom Curriculum Scope & Sequence http://www.commonsensemedia.org/educators/scopeandsequence 2. Searching, Advanced Searching, Recursive Web Searching, Information Literacy, Digital Literacy & Media Literacy Resources www.SearchFindKnow.com 3. Web Literacy Standard a Map of Competencies and Skills from the Mozilla Foundation https://webmaker.org/standard 4. PreK12 Technology Scope and Sequence . Generic version developed by My eCoach and aligned to ISTE Standards and Performance Indicators for Students http://www.myecoach.com/scope/intro.html 5. U.S. Department of Justice’s “Technology and People with Disabilities: The Current State of Federal Accessibility” 6. Tech Writing Handbook "This handbook will teach you how to create everything from manuals to work instructions. We’ll help you avoid the most common pitfalls of tech writing, from poor planning to outdated publishing" from iFixIt 7. Purdue Online Writing Lab (OWL) Contextualizing Plagiarism 8. “Seven Outstanding sites for teaching Copyright” http://www.educatorstechnology.com/2012/07/7outstandingwebresourcesfor.html 9. The Ninja Program is a free program for students and educators to learn how to use Google Apps for Education in a fun and social way. Study, take tests, earn badges, and become a Ninja Master http://www.ninjaprogram.com 10. Using Google Forms by Eric Curts https://docs.google.com/a/mogadore.net/document/d/15i1AamaA_47cI9Wc9Rw_ATr7h6yM0lp xofJImgzI/edit?hl=en&forcehl=1 11. ComputerBased Assessment: "Intermediate Constraint" Questions and Tasks for Technology Platforms” Kathleen Scalise, University of Oregon, June 2009 This website introduces a taxonomy or categorization of 28 innovative item types useful in computerbased assessment. The taxonomy describes "intermediate constraint" items. These item types have responses that fall somewhere between fully constrained responses (i.e., the conventional multiplechoice question) and fully constructed responses (i.e., the traditional essay). 12. 20 Technology Skills that Every Educator Should Have By Laura Turner http://www.guide2digitallearning.com/tools_technologies/20_technology_skills_every_educator_s hould_have 13. Stop just talking about 21st Century Skills, it time to be doing! A dozen things educators need to do for today’s students- http://goo.gl/Mtlcq 60 ***************************************************************************************************** 12 Things You Should Know to be Computer/Tech Literate by Anthony A. Luscre is licensed under a Creative Commons AttributionNonCommercialShareAlike 3.0 Unported License. Based on a work at www.searchfindknow.com. 2013 by Anthony A. Luscre [email protected] or [email protected] Portions of the material on types of Plagiarism are from http://plagiarism.org/plagiarism101/typesofplagiarism (In the interest of disseminating this information as widely as possible, plagiarism.org grants all reprint and usage requests without the need to obtain any further permission as long as the URL of the original article/information is cited.) ***************************************************************************************************** 61