Educational Blog


 1.Educational blogs
Blog is short for weblog. A weblog is a journal/diary/newsletter that is available for public viewing on the internet. Blogs help communicate to an audience without the fuss of sending out newsletters or other paper-based sources, it can be edited and updated regularly.
                        Using blogs in education provides pupils with their own personal writing space where they can write what they like. Schools can use them for individual, group or class publishing. Blogs have proved to be a fun way of working and encourage children to take more interest in their schoolwork.
           Creating your own blogger account
1.   Open Internet Explorer
2.   In the Address Bar type in: www.blogger.com Scroll down the page
3.   Click on Create Your Blog Now.

3.

4.   Then type blog tittle and blog address click continue button
5.   Choose a template click on continue button

6.   Now the screen  display Your blog has been created

Facebook

Facebook

Facebook is a social utility that connects us with the people, brands and organizations we care about. Founded in 2004 by Mark Zuckerberg, it has quickly become one of the most used and visited platforms for people of all ages to communicate and connect with friends and others who work, study and live around them.

Ways teachers can use Facebook

      Create a group for your class and strengthen the communication between you and your students.
      Schedule events for the entire class.
      Use message utility in Facebook to message your students about unexpected absences, rescheduling of exams...etc.,
      Share multimedia content like videos, photos, clips and more with your entire class
      Post class notes for students to review in case they were absent
      Try to involve students who are normally shy in the classroom
      Facilitate classroom connections through letting students know each other more
      Use Facebook to send reminders, announcements, upcoming due dates or any other classroom news.
      Encourage students to post content of their own such as videos, images, news stories and other media that relate back to their lessons.

Advantages of the use of Facebook in education

      Relaxed, friendly and inviting atmosphere which encourages students participation and engagement
      Students feel comfortable learning through Facebook because most of them use it everyday
      Facebook can promote collaboration and social interchange between participants

      Students get engaged about their learning outside the classroom

E-learning

e-learning concept
E-Learning is electronic learning, in which the learner uses a computer to learn a task, skill, or process. It is also referred to as computer-based training, web-based training, and online learning. E-learning is a new education concept by using the Internet technology, it deliveries the digital content, provides a learner-orient environment for the teachers and students. E-Learning is the use of technology to enable people to learn anytime and anywhere. E-learning (or eLearning) refers to the use of electronic media and ICT in education.
E-learning can occur in or out of the classroom. It can be selfaced,     asynchronous learning or may be instructor-led, synchronous learning. E-learning is suited to distance learning .E-learning is classified as two types online learning and offline learning

Online e-learning (Synchronous and Asynchronous)

Synchronous learning(at the same time)
Synchronous learning, which means at the same time requires interacting with an instructor through the internet in real-time. Synchronous means that an instructor is present when the course is delivered, even though the course might be delivered remotely over the Internet.  Synchronous e-Learning lets teachers conduct classes over the Internet. The synchronous technologies also allow people to interact with peers and experts.
Examples include:
n  listening to a live radio broadcast
n  watching live a television broadcast
n  audio/video conferencing
n  Internet telephony

n  online lectures
n  two-way live satellite broadcast
Asynchronous learning
Asynchronous, which means, "not at the same time," allows the learners to complete the web based training on his own time and schedule, without live interaction with the instructor. Asynchronous type classes are completely the opposite of synchronous classes which means that the instructor does not need to be present, therefore allowing learners to learn anytime, at their convenience. Characteristic for asynchronous learning is the fact that that the trainer prepares the courseware material before the course takes place. The learner is free to decide when he wants to study the courseware
n  Examples include:
n  self paced courses taken via Internet or CD-Rom
n  videotaped classes
n  stored audio/video Web presentations or seminars
n  recorded audio tapes
n  Q & A mentoring
   reading e-mail messages

Social networking

Social networking



A social network service focuses on building online communities of people who share interests and activities, or who are interested in exploring the interests and activities of others. Most social network services are web based and provide a variety of ways for users to interact, such as email and instant messaging services

Social Networks in Education

  1. • Provide a casual place of learning
  2. • Encourage students to express their own thoughts
  3. • Provide effective collaboration and communication
  4. • Enhance students’ learning experiences
  5. • Build an online learning community

Legal and Ethical issues

Legal and Ethical issues

Cracking
 Cracking is illegally entering a computer or a network and using or destroying its databases.
Pornography
 Pornography is the display and spreading of obscene information and pictures.
Copyright
The exclusive right given by law for a certain term of years to an author, composer etc.to print, publish and sell copies of his original work. Copyright allows authors, musicians, artists, etc. to make money of their labor.  It also prevents people from altering the work without permission. Copyright law can be protected, Literary Works, Musical Works, Dramatic Works, Choreographic Work, Pictorial, Graphic,  Sculptural Works, Motion Pictures ,AV, Sound Recordings, Architectural Works. It give the copyright holders  to reproduce the work, Right to prepare derivative works, Right to distribute copies for sale, Right to perform AV works publicly, Right to display musical and artistic works publicly.
Plagiarism
Plagiarism is the act of taking another person's writing, conversation, song, or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. Whenever you paraphrase, summarize, or take words, phrases, or sentences from another person's work, it is necessary to indicate the source of the information within your paper using an internal citation.
Hacking
The process of attempting to gain or successfully gaining unauthorized access to computer resources for the purpose of help or secure system is called hacking. Hacking is the technique in which any one can access and one’s computer without his permission . A hacker knows all about the operating system and different holes in the system. Computer hacking is when files on your computer are view created or edited without your authorization. Hacker can gain complete access to your computer from any were in the world if your computer is turned ON, unprotected and has an internet connection.
1.   White-Hat Hackers
The good guys who identify the security weakness of the system or network and inform the owner about them. A white hat hacker breaks security for no-malicious reason, perhaps to test their own security system or while working in a security company which makes security software. White –hat hacker is also referred to as the ethical hacker.
2.   Black Hat Hacker
A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Black hat hacker is also known as cracker. Black hat hacker break into secure networks to destroy data.
3.   Grey Hat Hackers

Grey hat hacker is the combination of black hat hacker and a white hat hacker .A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. Then they may offer to correct the defect for a fee.