Create an infographic (Affinity Designer is recommended for this) or Google Doc or podcast or video that shows an ICT-related ethical issue which:
- clearly defines what the issue is all about,
- convincingly shows us how to resolve it, and
- recommends alternatives/safeguards which exist to protect against such issues in the future (if applicable).
- Music and video file downloading
- Identity theft
- Keystroke logging
- Packet sniffing
- Biometric data
- Effective passwords
- Secure websites
- Cyber bullying
Be sure to give credit to all your sources!
Inspiration and credit for this assignment:
This list of tutorials has been recommended by my students (from this master list) and is a work in progress. The order of the tutorials is somewhat random right now but will be reordered based on student feedback.
- Beginners – Adjustments (difficulty: 1)
- Beginners – Exporting (difficulty: 1) (no assignment)
- Beginners – Filters (difficulty: 1)
- Beginners – Layers (difficulty: 1) (assignment: put a logo on a picture….your choice!)
- Removing background from Trees (Leaves selection) (difficulty: 1)
- Haze Removal (difficulty: 1)
- How to Change Eye Color (difficulty: 2)
- Inpainting (difficulty: 2)
- Layer Concepts (difficulty: 2) (no assignment)
- Shadows/Highlights (difficulty: 2)
- Curves (difficulty: 2)
- Clone Brush Tool (difficulty: 2)
- Refining Selections (difficulty: 2)
- Easily Create REALISTIC Light Beams (difficulty: 2)
- Adjustment Layers (difficulty: 3)
- Mask Layers (difficulty: 3)
- Affinity Photo Tutorial Manipulation Effects Editing (difficulty: 5) (Note 2)
- How to Retouch Skin in Affinity Photo (difficulty: 5) (Note 1)
You must do all the level 1 tutorials, a minimum of 5 level 2’s, and a minimum of 2 level 3’s, 4’s, and 5’s.
Note 1: take your own picture for this assignment.
Note 2: use only creative-commons photos for this assignment. Be sure to keep the links to your sources to give credit!
In the spirit of yesterday’s Safer Internet Day…
I often get asked which is better — Gmail or Hotmail (or its derivative outlook). The answer for me is so easy: Gmail, and one of the reasons is because it handles phishing attempts so much better than Hotmail.
I only log into my Hotmail account once a month or so, just to keep it alive. This time, there were approximately 20 emails in my inbox. A few were legitimate security alerts created by my Google account, a few were from Microsoft trying to sell me something or other, but the rest (over half) were phishing attempts — bogus emails attempting to get me to click a link where they would prompt me to reveal private details such as account numbers or passwords. Continue reading “Let’s Go Phishing!”
(This is an old post that has been moved to here from my previous blog.)
This morning I shared an article entitled “Teens’ Top 5 Technology Mistakes” with my BTT1O class. The five “mistakes” mentioned are:
- Forgetting to Log Out
- Right Message — Wrong Person
- Losing Track of Your Phone
- Making Friends With Strangers
Reviewing the article gave us a great opportunity to share many stories, including:
- students not logging out and other students sending crude messages from their Facebook account
- students creating fake Snapchat accounts to use to get other students to send them inappropriate pictures
- stories of students not being able to get jobs because of what they shared on their social media accounts
- and others…
Continue reading “Digital Literacy Resource — Teens’ Top 5 Technology Mistakes”