Saturday, 17 December 2016
Tuesday, 29 November 2016
Women and programming
Read this article via El Confidencial - Por qué las mujeres dejaron de programar en 1984 (y todo cambió)
Sunday, 3 July 2016
Thursday, 30 June 2016
September exams
Os recuerdo que, hay que acudir al centro en la fecha y hora publicada en la web del centro con las tareas ya hechas y las revisaremos allí.
Copia de la información que está colgada en la web del instituto:
Para consultar el material con el que se ha trabajado en clase, los requisitos y los criterios de calificación de cada una de las tareas, deberá acudirse al blog de la asignatura en el siguiente enlace:Para consultar las tareas pendientes, los alumnos deberán acudir a su correo electrónico en gmail, donde encontrarán la relación de las mismas y algunas recomendaciones, en un correo personalizado.En caso de duda, puede conectarse con la profesora de la asignatura mediante el mismo correo electrónico.
Tuesday, 14 June 2016
How computers work. Information
More about BINARY:
Monday, 13 June 2016
Phishing and Spam IQ Quiz
SonicWALL has published a fun, informative quiz to test how well you distinguish between email schemes and legitimate email. Check it out at http://www.sonicwall.com/phishing/.
Monday, 6 June 2016
Tasks to review (3rd "Evaluación" assignments)
Please, check that you have done everything before Friday 10th 23:55 h.
- Prezi about "Software" on your blog
- Thinglink (personal one) on your blog. If you have not done it yet, better use one of the options of Genial.ly.
- Thinglink about "IT safety" on your blog.
- Peer-assessment of the other teams' Thinglink. DONE
- Self-assessment of your team's Thinglink (you should have received an email with the rubric as a form to complete).
- Connected (the game). Play and publish a new post on your blog with your username and score (or a screenshot with your score highlighted).
- Digital Identity Investigation about your classmates. Google Drive Presentation (private, remember you have to invite me so I can check it).
- "Social Networks and Chats" Form: "¿Te enredas en las redes sociales?
- Linoit: "¿Cómo te comportas en Internet?. Use postits to describe how you behave.
- MEME: Publish it on your blog, on our collaborative Padlet and (optional but rewarded) on Twitter, Facebook and/or Instagram with hashtags: #RedConsejos and #SaramagoConsejos.
Please, check that you have done everything before Friday 17th 23:55 h.
- Prezi about "Software" on your blog
- Thinglink (personal one) on your blog. If you have not done it yet, better use one of the options of Genial.ly.
- Thinglink about "IT safety" on your blog.
- Peer-assessment of the other teams' Thinglink. DONE
- Self-assessment of your team's Thinglink (you should have received an email with the rubric as a form to complete).
- Connected (the game). Play and publish a new post on your blog with your username and score (or a screenshot with your score highlighted).
- Digital Identity Investigation about you and your classmates:
a) Digital Identity Sheet completed
b) A post on your blog telling everything your have done using the digital identity sheet. - "Social Networks and Chats" Form: "¿Te enredas en las redes sociales?
- Linoit: "¿Cómo te comportas en Internet?. Use postits to describe how you behave.
- Create a MEME: Publish it on your blog, on our collaborative Padlet and (optional but rewarded) on Twitter, Facebook and/or Instagram with hashtags: #RedConsejos and #SaramagoConsejos.
2nd "Evaluación"- Some of you have to complete the Operating Systems homework on Padlet.
Thursday, 2 June 2016
Wednesday, 1 June 2016
MEMES
What is a 'Meme'?
MAKE MEMES WITH ADAPTED SAYINGS
The process could be as follows:
A "meme" is a virally-transmitted cultural symbol or social idea. A meme behaves like a flu or a cold virus, traveling from person to person quickly, but transmitting an idea.
Historically, a meme is a discrete "package of culture" that would travel via word of mouth, usually as a fascinating story, a fable/parable, a joke, or an expression of speech. Today, memes travel much faster than simple speech. As internet email forwards, instant messages, and web page links, memes now travel instantly via the Internet.
MAKE MEMES WITH ADAPTED SAYINGS
The process could be as follows:
- Choose saying.
- Adapt it to the new forms of communication.
- Choose a free image rights. In this way you can get them from: https://pixabay.com/es/.
- Make the meme. You can use:
- Share it on the padlet at the bottom. You will find there some examples. Do not forget your name and course.
- Share it on Instagram, Twitter and/or Facebook with the hashtags: #RedConsejos and #SaramagoConsejos.
- Share it on your blog.
Labels:
Internet
,
safety
,
task 2015/16
,
your tasks 2015/16
Monday, 30 May 2016
Saturday, 21 May 2016
Thursday, 19 May 2016
Netiquette
"Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace.
Labels:
Internet
,
netiquette
,
privacy
,
safety
,
Social networks
Saturday, 14 May 2016
May 17th, Internet Day
Are you ready?
Friday, 13 May 2016
Thursday, 12 May 2016
Protecting yourselves on Social Networks
- Configurar privacidad en Facebook
- Configurar privacidad en Twitter
- Configurar privacidad en Instagram
- Configurar privacidad en Snapchat
- Configurar privacidad en Whatsapp
Siete formas de recuperar parte de la privacidad que te ha robado Zuckerberg
"Facebook, Instagram y WhatsApp se han convertido en una tríada imparable que se ha colado en tu día a día casi sin que le dieras permiso, pero quizás quieras ocultarles ciertas cosas y controlar, en la medida de lo posible, lo que saben de ti."
Read the article to know how.
Wednesday, 11 May 2016
Tuesday, 10 May 2016
Privacy
How can I protect my digital identity?
Link to infographic
You can protect your digital identity on the Internet by being alert to scams, employing strong passwords, installing anti-virus and anti-spyware software and keeping it up-to-date and checking your settings in your social networks accounts and your operating system. But, there are still more things you can do.
Think twice!
Hold on a minute. Before you post that image, blog or tweet, consider the content. If it breaks even one of these rules, think really hard about putting it out there!
DO NOT...
Send a picture to someone via email/snapchat/instagram that you wouldn’t want your teacher, boss, principal, or grandma to see!
Sure you are sending them to your good friend or significant other. But what happens when that person is no longer your best friend? Or maybe their phone gets nabbed by someone with less morals.
The online proof: There are many sites that allow people to submit naked photos of their exes. I have taken down the links because they are NSFW (Not Safe for Work) and a breach of privacy.
Post personal information that is not readily available
Think about the last time you had to recover a password online. Was the question: Pet’s name, childhood street, kid’s birthday or mother’s maiden name? Make sure that kind of information stays private and don’t use it for the actual passwords.
The online proof: Here are the most common and hackable passwords.
Announce when you are going away
Yes, your friends are excited that you only have 3 more days until you leave for Hawaii! But so is the guy that has been staking out your house.
The online proof: The website PleaseRobMe.com is a collection of data from various social sites that tells you who is away. This one is for educational purposes but ....
Underestimate what your device or computer already knows about you
All online content is tagged with metadata which contains anything from the timestamp it was created to the location. You cannot see the metadata when you post but simple free software can pull it for someone else. Be wary of geotagging on mobile devices, which marks where you took the photo.
The online proof: Check out I know where your cat lives for a series of random cat pictures pulled off the Internet and then tagged to the location where they were taken using hidden metadata.
Forget to set your privacy settings
Not only should you check your settings at the outset but you should recheck them frequently. Facebook, for example, uses an ‘opt out’ policy which means that by default you are sharing more information until you go in and update those settings. Follow us on Twitter or Facebook or join our mailing list to get those updates sent to you.
The online proof: Here is a fantastic infographic that shows how Facebook privacy settings have changed and what data is now available if you haven’t updated them.
Post negative comments about your highschool/workplace or classmates/teachers/coworkers
Even if your teacher, boss, classmate or coworkers are not able to see your comment, a future employer could see that comment and reconsider hiring you later. Even with privacy settings set, you are at the mercy of our online friends not to share.
The online proof: Here are examples of people actually fired due to their social post.
Post photos of your friends that break the first rule
It is a great photo of you. So what if your friend is doing something in the background that would tarnish their reputation? If you tag them, your friend can remove the tag, but unless the photo violates terms and conditions (allowing a site to pull it down) only you control the permissions on that photo. Put yourself in their shoes (and hope they would do the same). This goes double for pictures of underage kids. If the child is under 18, you technically need the parents permission to post it.
The online proof: This article talks about the inability to remove someone else’s photo.
Use the same password for every account
I know it is a pain to remember different passwords for all of your sites but it is an even bigger pain if someone hacks in to one of your accounts. Are you using the same password for your social networks, banking, or online shopping? If a hacker finds just one instance of your password then they will now have access to everything.
The online proof: Here is just one example where hackers breached the Adobe database and were able to access users’ Facebook accounts because the email-password combinations were the same.
DO NOT...
Send a picture to someone via email/snapchat/instagram that you wouldn’t want your teacher, boss, principal, or grandma to see!
Sure you are sending them to your good friend or significant other. But what happens when that person is no longer your best friend? Or maybe their phone gets nabbed by someone with less morals.
The online proof: There are many sites that allow people to submit naked photos of their exes. I have taken down the links because they are NSFW (Not Safe for Work) and a breach of privacy.
Post personal information that is not readily available
Think about the last time you had to recover a password online. Was the question: Pet’s name, childhood street, kid’s birthday or mother’s maiden name? Make sure that kind of information stays private and don’t use it for the actual passwords.
The online proof: Here are the most common and hackable passwords.
Announce when you are going away
Yes, your friends are excited that you only have 3 more days until you leave for Hawaii! But so is the guy that has been staking out your house.
The online proof: The website PleaseRobMe.com is a collection of data from various social sites that tells you who is away. This one is for educational purposes but ....
Underestimate what your device or computer already knows about you
All online content is tagged with metadata which contains anything from the timestamp it was created to the location. You cannot see the metadata when you post but simple free software can pull it for someone else. Be wary of geotagging on mobile devices, which marks where you took the photo.
The online proof: Check out I know where your cat lives for a series of random cat pictures pulled off the Internet and then tagged to the location where they were taken using hidden metadata.
Forget to set your privacy settings
Not only should you check your settings at the outset but you should recheck them frequently. Facebook, for example, uses an ‘opt out’ policy which means that by default you are sharing more information until you go in and update those settings. Follow us on Twitter or Facebook or join our mailing list to get those updates sent to you.
The online proof: Here is a fantastic infographic that shows how Facebook privacy settings have changed and what data is now available if you haven’t updated them.
Post negative comments about your highschool/workplace or classmates/teachers/coworkers
Even if your teacher, boss, classmate or coworkers are not able to see your comment, a future employer could see that comment and reconsider hiring you later. Even with privacy settings set, you are at the mercy of our online friends not to share.
The online proof: Here are examples of people actually fired due to their social post.
Post photos of your friends that break the first rule
It is a great photo of you. So what if your friend is doing something in the background that would tarnish their reputation? If you tag them, your friend can remove the tag, but unless the photo violates terms and conditions (allowing a site to pull it down) only you control the permissions on that photo. Put yourself in their shoes (and hope they would do the same). This goes double for pictures of underage kids. If the child is under 18, you technically need the parents permission to post it.
The online proof: This article talks about the inability to remove someone else’s photo.
Use the same password for every account
I know it is a pain to remember different passwords for all of your sites but it is an even bigger pain if someone hacks in to one of your accounts. Are you using the same password for your social networks, banking, or online shopping? If a hacker finds just one instance of your password then they will now have access to everything.
The online proof: Here is just one example where hackers breached the Adobe database and were able to access users’ Facebook accounts because the email-password combinations were the same.
Binary tatoo tips. Adapteded
Link to infographic
Labels:
digital identity
,
infographic
,
privacy
,
safety
Monday, 9 May 2016
Digital Identity
After these tasks...
How are you defining YOUR digital identity?
Our digital identity, or tattoo, is the permanent collection of data about us that is available online. Each time we post a picture, a blog, a status or a tweet, we are adding to that digital identity.
As more online applications become part of our daily lives, our digital identities become increasingly more detailed. There are over a billion pieces of content added to Facebook every day!
But it is not only what you do but what others do!
Sharing every detail of your lives online is a great potential risk.
What does our digital identity say about us? Who is reading this information? Who is storing this information? What are they doing with it? What impact will it have on our future? What does it say to future employers? The Dean of Admissions? Our descendants? Your insurance company?
Read:
Read:
Tuesday, 3 May 2016
Digital Identity sheet and tasks
For your tasks: link to digital identity sheet
Your task:
Your task:
4th ESO
Write a post on your blog, using all the information you have discovered about you and your classmates. Use your "Digital Identity sheet" and the 4 steps you have followed. If you use images to illustrate your post, remember you have to use CC or Public domain licensed images.
1st Bachillerato
Create with your partner a collaborative presentation on Google Drive with the results of your investigation. It has to be private and do not forget to invite me.
When you finish, publish a post on your blog with the link to that PRIVATE presentation.
When you finish, publish a post on your blog with the link to that PRIVATE presentation.
Monday, 2 May 2016
Digital Identity. What about you?
What do others see about you on the Internet?
To be sure that you are viewing your public profile, log out of your social networks before (Facebook, for example), or go to a new browser, and you will see exactly the same as a stranger will in them.
Write exactly your full name. Use the quotes. I mean, write into the Google search box "Federico Garcia Lorca" and "García Lorca, Federico". You will see how you find results about you, or at least, about people with the same name.
What does Google know about me?
Now, logged in your Google account, write "¿Qué sabe Google sobre mí?
Go to the link highlighted and check the results from the 6 links you are provided. Surprised?
Let's control what Google shows about us
Go to https://aboutme.google.com/. Check and edit. Protect your personal information!
How to stop Microsoft spying on us?
Cómo evitar que Windows 10 te espíe por computerhoy
Read:
What does Google know about me?
Now, logged in your Google account, write "¿Qué sabe Google sobre mí?
Go to the link highlighted and check the results from the 6 links you are provided. Surprised?
Let's control what Google shows about us
Go to https://aboutme.google.com/. Check and edit. Protect your personal information!
How to stop Microsoft spying on us?
Cómo evitar que Windows 10 te espíe por computerhoy
Read:
Así utilizan tus datos Facebook, Google, Apple y Microsoft. Computer.hoy.com News
Labels:
digital identity
,
privacy
,
safety
,
task 2015/16
Digital Identity. Investigation
Let's investigate about our digital identity!
What can I find about my classmates?
We are going to investigate about your classmates. Use:
- Google Search. Write exactly a full name. Use the quotes. I mean, write into the Google search box "Federico Garcia Lorca" and "García Lorca, Federico". You will see how you find results about your classmate, or at least, about people with the same name.
- Log in your social networks and continue with your investigation.
- Google Search. Write exactly a full name. Use the quotes. I mean, write into the Google search box "Federico Garcia Lorca" and "García Lorca, Federico". You will see how you find results about your classmate, or at least, about people with the same name.
- Log in your social networks and continue with your investigation.
Labels:
digital identity
,
privacy
,
safety
,
task 2015/16
Monday, 25 April 2016
Your Thinglink presentations about IT Safety
Your IT Safety presentations on Thinglink on PhotoPeach
Sunday, 24 April 2016
Saturday, 23 April 2016
Tuesday, 19 April 2016
Rubric to assess your IT Security Thinglink presentation
Here you have the link to the Thinglink rubric for 4th ESO and 1st bachillerato. We will use a similar one for 1st Bachillerato.
Review the rubric carefully before, during and after the creation of the ThinkLink presentation, to ensure that all intended elements of your ThingLink have been represented and all other criteria have been met.
We will use this rubric for:
- PEER-ASSESSMENT (after your presentations in class)
- SELF-ASSESSMENT
- TEACHER-ASSESSMENT
Sunday, 10 April 2016
Connected, again
Link to original image on Pixabay CC |
Now, we are ready to play a new version of the game in English and, may be, win a wonderful technological prize this time.
Click on the image to begin:
"Connected" is an on-line game for 14-16 years old students.
It is a virtual treasure hunt (gyimkhana) conducted by the FAD (Fundación de Ayuda contra la Drogadicción) in collaboration with Google, and the participation of Twitter, which deals with the use of new technologies and Internet.
Players will run with a robot and overcoming obstacles, tests and quizzes will transform the robot into a human being.
Wednesday, 30 March 2016
Proyecto Voluntariado Centro Municipal de Mayores
Centro Municipal de Mayores 'Reina Sofía'
Calle del Mayor 1 (antigua calle Mieses)
Ejemplos de blogs:
- Blog de mi vida: http://blogueandodemivida.blogspot.com.es/.
- Blog que no puede ser más que de una chica muy, pero que muy freaky: http://judibelula.blogspot.com/. ¿Super cursi?.
- Blog del abuelo: http://elblogdelabuelo-elbaile.blogspot.com.es/.
- Blog del Real Madrid: http://fansdelmadrid.blogspot.com/.
- Blog de Poesía: http://josebaenabaena.blogspot.com.es/.
- Blog de Cuentos: http://sonandocuentos.blogspot.com.es/.
- Blog de recetas: http://xoriguer48-lasrecetasdelabuelo.blogspot.com.es/.
- Blog de recetas de una yaya salvaje: http://yayasalvaje.blogspot.com.es/.
- Blog de Fama a bailar 2: http://blogfama.wordpress.com/.
- Blog de tenis de mesa: http://e-tenisdemesa.blogspot.com/.
- Blog de una artista: Paula Echevarría: http://paula-echevarria.blogs.elle.es/
- Blog de una pareja de novios: http://elblogdelosnovios.blogspot.com/.
- El blog de alguien que parece que no hace otra cosa: http://blogdelatele.blogspot.com/.
- Blog de adolescentes y jóvenes: http://adolescentes.blogia.com/.
- Un blog muy hip-hopero: http://proyectosikarios.blogspot.com/.
- Blog de ajedrez: http://superajedrez.blogspot.com/.
Monday, 7 March 2016
International Women's Day 8 March
Tuesday, 1 March 2016
Thinglink: Make your images interactive!
Thinglink: https://www.thinglink.com
Take a look at how I've used this image with Thinklink:
I've used: plain texts, images, links, videos, google docs...
Activity:
Take a look at how I've used this image with Thinklink:
I've used: plain texts, images, links, videos, google docs...
Activity:
- Now create your own account,
- Upload an image an learn how to make it interactive.
What is a Computer Hardware Engineer?
This interactive image has been created with Thinglink:
Begin at the top-left icon and continue clockwise.
Saturday, 13 February 2016
Reviewing hardware and software vocabulary and content
Operating Systems
An operating system is the most important software that runs on a computer. It manages the computer's memory, processes, and all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's "language." Without an operating system, a computer is useless.
An operating system is the most important software that runs on a computer. It manages the computer's memory, processes, and all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's "language." Without an operating system, a computer is useless.
Labels:
hardware
,
interactive activity
,
operating systems
,
software
,
task 2015/16
Tuesday, 9 February 2016
Monday, 1 February 2016
Rubric to assess your Software Presentation on Prezi
Here you will find the rubric done in a Google Drive spreadsheet for 4th ESO. It will be the same one for 1st Bachillerato.
This is the way your Prezi about software is going to be assessed. So, check it carefully!
Sunday, 31 January 2016
Software on Prezi
Friday, 29 January 2016
Prezi - Presentations
Prezi: https://prezi.com/your/
Example:
Prezi is a presentation software that uses motion, zoom, and spatial relationships to bring your ideas to life and make you a great presenter. It uses a zooming user interface (ZUI) which allows to display and navigate through information.
Example:
Tuesday, 26 January 2016
Rubric to assess your Hardware Mind Map on Popplet
Here you will find the rubric done in a Google Drive spreadsheet for 4th ESO. It will be the same one for 1st Bachillerato.
This is the way your Mind Map is going to be assessed. So check it carefully!
This is the way your Mind Map is going to be assessed. So check it carefully!
Monday, 11 January 2016
Computer parts Mind Map
Labels:
computer
,
hardware
,
Mind map
,
task 2015/16
Thursday, 7 January 2016
Popplet - Mind Maps
http://popplet.com/
Examples of mind maps:
Examples of mind maps:
- Create an account on www.popplet.com
- Create a new Popplet.
- Add "popples" to your Popplet.
- Add pictures, drawings, and videos to your Popplet.
- Add a collaborator to your Popplet.
- Share or embed your Popplet.
Subscribe to:
Posts
(
Atom
)