The Association For Women In computing (AWC)
AWC is a national, nonprofit, professional organization for individuals with and interest in information technology. AWC is dedicated to the advancement of women in the computing fields, in business, industry, science, education, government, and the military. AWC provides opportunities for professional growth through networking and through programs on technical and career-oriented topics.
AWC's impact on me or it's members is to Promote communication among women in computing. Also further the professional development and advancement of women in computing and promote the education of women of all ages in computing.
JLTC is a web site designed to help educators. The well connected educator is the online publishing center for teachers and others in the education community. JLTC will help teach student how to use the internet and search for information. It's goal is to provide a forum for discussion of educational technology issues; to encourage reflective practice and collaboration and to promote thinking in the education community about reform and the impact of technology on student learning.
www.cnn.com/tech/9709/09/pagers.lat/
New Pagers Will offer Internet access You will now be able to recieve the Internet on your pocket pager. Just fire up your pager and find all that information on the Web. Later this month, WolfeTech will unveil Pocket Genie, the first software system for visiting Web sites via a two-way pager. I think the pagers will make accessing the Internet more convient and it will allow people that don't have computers access to the Information Super Highway.
Source CMC Magazine
Computer-Mediated Communication Magazine Volume 4, Number 9 / September 1, 1997. The articles on this site let you know that someone or some agency is snooping into your private affairs or is trying to keep tabs on what you are interested in. The article that I read (The Anonymizer). Shows me that every web site that I visit can keep a track of me or that a file has been loaded onto my computer that I didn't know about. It brings to my attention that privacy and anonymity are important to me and many others. the following paragraph is a cutout of this article that shows you what when you visit certain web pages. It also alerted to the cookie, and now I know how to turn off cookies in explorer.
In 1995, I created a demonstration web page called The Snooper to illustrate how much information a web site could gather on a user just from his or her having visited a single page. The results surprised me and many others.
Amal Shaaban
Teach a Child to Read with Children's Books I selected this article because learning how to read doesn't have to be difficult or boring for children. Children can use this page at school or home it also has a guide for parents, parent volunteers, teachers and others who work one-on-one with children. The program offers an intergrated, child-centered approach to helping children to learn to read.
Books: The core of a good reading program Books should be the central element in any reading program. Resources have shown that most reading programs do not introduce real books into the program. Letters cards, memorization drills, and the like are the primary modes of instruction in the first months of these programs. Teach a child to read guides readers to be successful, it shows how to prepare children for reading and using children's literature. The program is easy to use, enables record keeping and lesson plan forms.
Learning to read, can be meaningful and fun, from the start.
Amal Shaaban Margo's page
Critique: I think it is a very good web page for Seventh graders. I think it is a very good resource for students to get on the on the net. The graphics are outstanding and well thought out. Her links are clear and simple to use. I like her site enough that I would like to make my web pages in that format.
Amal Shaaban
New chip boosts computer's power and storage
Intel has developed a new type of memory chip that could improve computers. The technology alters the basic structure of memory chips. It will allow manufacturers to cram more capacity into the circuitry at the heart of computers and other electronic devices.
Intel will increase the storage of flash memory chips, which enable computers to hold information even when they're turned off. Intel said that the new chips will shorten the time cycle of Moore's Law, a central tenet of computer technology that for three decades has accurately predicted that microprocessors will get twice as powerful for the same price every 18 months. The new chip will likely be used in a variety of devices including personal computers, video games and portable telephones. It could, for, example, greatly increase the number of images that can be stored in digital cameras.
Amal Shaaban
Eric paper learning theory. I went over several learning theories and reviewed some of them, and this is what I selected. "CONTROL THEORY" by William Glasser.
All human beings are borne with five basic needs built into their genetic structure: survival, love, power, freedom and fun. Control Theory is a descriptive term, Glasser said we try to control our own behavior so that what we choose to do is the most need-satisfying thing we can do at the time.
In response to complaints that today's students are "unmotivated," . If students are not motivated to do schoolwork, it is because they understand schoolwork as unconnected to their basic needs. "Boss teachers" use reward and punishment as external coercion -- ultimately limited to the kind of compliance behavior which can be coerced. Glasser calls it "leaning on your shovel," and demonstrates than high percentages of school students are aware that the work they do (even when schools praise them) is this kind of low-level work.
"Lead teachers" instead eschew coercion completely; make explicit students' intrinsic rewards; feel obligated to connect any proposed work to students' basic needs until students are satisfied; and use grades only as temporary indicators of what has and hasn't been learned (not as a reward). Lead teachers "fight to protect" students who are doing quality work (highly engaged, deeply motivated) from meaningless requirements.
Implications For:
William Glasser, The Quality School, Harper & Row, 1990.
EJ402380. GLASSER, WILLIAM;. THE QUALITY SCHOOL.; "PHI DELTA KAPPAN; V71 N6
P424-35 FEB 1990"; .
-ERIC_NO-EJ402380
-TITLE- THE QUALITY SCHOOL.;
-AUTHOR- GLASSER, WILLIAM;
-JOURNAL_CITATION-"PHI DELTA KAPPAN; V71 N6 P424-35 FEB 1990";
-LANGUAGE- ENGLISH;
-DESCRIPTORS- ACADEMIC_ACHIEVEMENT ELEMENTARY_SECONDARY_EDUCATION
SCHOOL_EFFECTIVENESS STANDARDIZED_TESTS COOPERATIVE_LEARNING ELITISM
OUTCOMES_OF_EDUCATION STUDENT_ATTITUDES STUDENT_NEEDS
-IDENTIFIERS-DEMING (W EDWARDS);
CONTROL THEORY;EDUCATIONAL RESTRUCTURING;
STUDENT PERFORMANCE WILL CONTINUE TO DROP AS LONG AS TRADITIONAL SCHOOL MANAGEMENT TELEGRAPHS THE MESSAGE THAT LOW-QUALITY WORK IS ACCEPTABLE. NOTHING OF HIGH QUALITY, INCLUDING SCHOOL WORK, CAN BE MEASURED BY STANDARDIZED MACHINE-SCORED TESTS. BY USING CONTROL THEORY, BOTH STUDENT AND TEACHER WORKERS CAN BE MORE EFFECTIVELY MANAGED WITHOUT COERCION.
Teachers also need to be lead which means being encouraged and praised by administrators who go into their classed and complement both them and their students for any quality work that they do.
Amal Shaaban
The site I chose is.
Educational Technology Center (ETC) The paper focuses on Learning about the Internet and the Web understanding and using the Web for teaching and publishing.Face to Face Courses Some ETC courses that let us meet you in person. Lets go briefly over the article.
There are many ways for you to go beyond a brief introduction. One structured method is to make use of online handbooks, such as the Electronic Frontier Foundation's 456k Guide to the Internet [1], it's obsolete hypertext version [2], or John December's massive Internet Web Text [3]. Macintosh users have a real treat with the online version of the Internet Starter Kit for Mac [4] (Third Edition) and Adam Angst's Internet Resources [5]
A less structured method is to make use of the professional skills of the communicators employed by our ABC by browsing through the archives of such programs as Click On! (http://www.abc.net.au/rn/clickon!/click.htm) •http:// (http://www.abc.net.au/http/) and Hot Chips (http://www.abc.net.au/hotchips/default.htm) . Additional local resources include such magazines as Internet Australia (http://www.interaus.net/magazine/) •21C (http://www.21C.com.au/) Six Magazines at IDG (http://www.idg.com.au/) •Your Computer (http://www.com.au/yourcomputer/) •Australian Personal Computer (http://www.com.au/apc/) or further afield at Byte (http://www.byte.com) •Mac User (http://www.zdnet.com/macuser/) •PC World (http://www.enews.com/magazines/pc_world/current/) •MacWorld (http://www.macworld.com/) •The Ziff Davis Group (http://www.zdnet.com/home/filters/toc.html)
I think The World Wide Web " a teaching and learning resource " very good . it is the way of the future for open learning and international education, allowing point-and-click navigation around vast multimedia educational resources. It can also allow you to easily provide your teaching material to students on- and off-campus. This session will show what the web is and what you can do with it •how to access existing resources for your subject how to efficiently use the software that lets you browse the Web how to turn your teaching material into hypertext and hypermedia that can be accessed from anywhere in the world.
Amal Shaaban
by Matt Rosoff
(9/10/97)
The Millennium Bug is not what some people are thinking it is. People tend to make a big deal of it when it will only effect some computer systems. The following article explains about what to expect from the (Y2K) bug. The event has appeared in major newspapers and magazines. Just to refresh your memory, many computer systems, particularly mainframes programmed in a language called COBOL, have date fields that can only handle two digits--for example, 1995 must be entered as 95. If these machines aren't fixed by the time the year 2000 rolls around, they will interpret 00 as 1900 and spew out inaccurate or incomplete data. The Y2K bug is so widespread that every business and organization will have to allocate some resources toward a fix, this part is true.
Don't believe the stories about the millennium bug. They would have you believe that it will cause airplanes to fall to the ground, ATMs to shut down. But in reality the Y2K bug is real and the risks are there. The people who are actually working on the problem say that the myths and exaggerations about Y2K have overshadowed the reality. Most large companies are aware of the problem, and they're working on it. In nearly every case, they expect the bug to have little or no effect. So why are so many loud voices warning of an apocalypse? I'm interested in this article to let everybody know the truth about the year 2000, find out for yourself.
amal shaaban
Amal Shaaban 10/23/97 Education Technology papers: Model: Peanut Butter and Jelly Sandwich Needs Assessment: The steps for making peanut Butter and Jelly help students to be specific While working on the computers. Because computer can be very picky about The information they are given. And that also help students understand the concept of computers. Student will be asked after they make the Peanut Butter sandwich: *If the sandwich looks like one. **If they followed the instructions if not they will be asked how the confusion could be avoided ' Finally student will be asked how this relates to typing commands on the computers. Design:" The example" The instruction of the steps of making peanut butter and Jelly will be on wall in my classroom. The length will be 55 inches and the width will be 75 inches. Next to the instruction anther peace of paper has on it the instruction of how to follow these steps on the computer and to be specific "with pictures" I will have the students follow the example on the wall every time they tuning on the computers. Development and Implementation: Students will be able to understand and follow instruction. Every time the students working on the computers they have to think about making peanut better and Jelly and relate the importance of being specific with the commands on the computer. Identifying the reasons for being specific when working on the computers is very important Evaluation. This lesson is not using a computer. Writing down the steps without confusion tells the student to be more effective and precise using the commands. In the computer lesson I will check to see if the students following the instruction on the wall. I will go around and review each step they using on the computer. Finally, the instruction on the wall will be very helpful to increase the student ability of following direction.
Amal M. Shaaban
10/23/97
2- Curriculum resource:
Togglthis:
Is a technology company provides the software to create animated, intractable and interactive characters for the Internet and other digital media.
IC makes it possible for developers to create original personalities. Offering full animation and true interactivity. Togglethis delivers its characters on a platform-independent basis with minimal download delays.
Togglethis offers IC technology as an innovative system for developers to create interactive content cost-effectively through an easy to use.
IC technology is composed of three elements: studio, server, and engine
And speech.
The benefits of IC technology:
1-TV quality animations delivered over Internet in second
2-easy to use point-and-click authoring tool
3-capabilities for branching story telling
4-e-mail or Internet delivery of content
5-cross-platform
>br>This site is very good resource for the student and teachers on the net.
Amal Shaaban
10/23/97
3- News article:
Some computer games flunk senators' report card: November 26, 1997 Computer and video games are very popular gifts this holiday season, But two U.S. senators are concerned that some of them are too gory and violent to fall into the hands of our children. And now computer and video games contains plenty of violence. Sen. Joseph Lieberman, a Connecticut Democrat, singled out a game called "Postal," in which innocent citizens are shot, bombed and terrorized, as indicative of the kind of game that should not be available to our children. "They are, in fact, digital poison." He said Lieberman spoke at a news conference held by the National Institute on Media and the Family to announce the results of the third annual Video Game Report Card. Lieberman and Sen. Herb Kohl, a Democrat from Wisconsin, say the rating system that they encouraged the electronic game industry to create in 1994 is working very well.
Too violent, too graphic Every new video and computer game released this year carries a rating that is both informative and easy to understand. But there is concern that many children still have access, through the Internet or in arcades, to games that are inappropriate. The senators said tougher enforcement is needed at retail and rental counters. They also complained that violent games, which represent anywhere from 12 percent to 25 percent of sales, had become even more gory and graphic. "I think the concern is that some of these violent, inappropriate games ... contribute to a kind of overall culture of disrespect that I think is increasingly of concern among young people in the United States," said the institute's David Walsh. I agree that some games are not intended for children and we parent should have control over what we should buy for our children. The IDSA offers its own "Consumer's Guide to Holiday Hits" to help game-players find the titles for holiday gift. And Kohl and Lieberman praised the game industry for producing a majority of titles that not only are "kid friendly" but are "mentally stimulating" as well. Among the games they praised were "Crash Bandicoot, Gettysburg, and American Girls."