12 Things You Should Know to be Computer/Tech Literate

Transcription

12 Things You Should Know to be Computer/Tech Literate
12 Things You Should Know to
be Computer/Tech Literate
It is tempting to think that because you have used a computer for a long time, you
are “computer literate” or “computer savvy,” but this is not always the case. Here are a
dozen skills you should know to be considered computer literate in today’s job market. If
you do not know these or are not sure, you can follow the detailed outline with
information on each of the twelve topics. If you already know these, you should be helping
others learn them as well!
http://goo.gl/uSmdu
1
Please leave comments, suggestions and/or questions at
http://goo.gl/xeUkd
For a copy of the Scope & Sequence by Gradevisit http://goo.gl/tcp2k
12 Things You Should Know to be Computer/Tech Literate
by Anthony A. Luscre is licensed under a
Creative Commons Attribution­NonCommercial­ShareAlike
3.0 Unported License.
Based on a work at www.searchfindknow.com.
2013 by Anthony A. Luscre ­
mo_luscre@mogadore.net or anthony@searchfindknow.com
Portions of the material on types of Plagiarism are from
http://plagiarism.org/plagiarism­101/types­of­plagiarism
(In the interest of disseminating this information as widely as possible,
plagiarism.org grants all reprint and usage requests without the need to obtain
any further permission as long as the URL of the original article/information is cited.)
2
1. Understanding Computer/Technology Hardware­ It is tough to have someone help you with a
problem when you tell them that your “hard drive” is unplugged, when you really mean “the computer.”
There are a number of common hardware misunderstandings out there, and while some are
understandable (for instance, confusing a network interface with a modem- cables look similar and they
serve the same purpose, networking), knowing basic hardware terminology is a must-have skill to be a
savvy user.
2. Operating System Basics­ Names of device types or generations of computers are often derived
from their Operating System (OS) name. Operating Systems are the software that enables hardware
devices to function and allows programs/Apps to be run on the device. All computing devices have an
operating system. In addition to brand or type of OS there is usually a version number or name (Windows
7, iOS Tiger, Android Ice Cream Sandwich, etc.) Understanding a device’s Operating Systems allows you to
more efficiently use your device, make decisions on which type of device you want to buy and which
software programs, Apps and/or hardware peripherals are compatible with it.
3. Effective & Efficient Web Browsing­ It is almost painful to watch some “computer savvy” people
operate a Web browser. The most obvious goof is going to a search engine to type in the address of the site
they want to go to. But folks are unaware of a lot of other things they do that make the Internet more
difficult than it needs to be. Mastering techniques like opening links in new windows, using bookmarks,
editing URLs to perform navigation, clearing the browser cache, and understanding common error
messages will give you access to a world of unlimited information instead of keeping you stuck with only
what Web site designers make obvious.
4. Searching & Search Engines­ Using a search engine is more than typing in the address, putting a
couple of keywords into the big text box, clicking Search, and choosing the first result. While that may
work, it won’t give you the best results much of the time. Learning the advanced search, Boolean
operators, and how to discern good results from bad results goes a long way toward enabling you to use a
computer as a powerful research tool.
5. File/Document Management­ It is not very productive if you cannot find it after you have create it.
Files also contain much more information; including dates, attributes, user data, etc.
6. Using Productivity Tools a.k.a. “The Intuitive User's Guide to finding your way around in almost any
software”. Most computer programs share very similar layout and functions. By learning the basics,
users can easily adapt to use of new software. Savvy users will find that there are multiple ways to
accomplish a task in a program, including menus, context sensitive right click menus, & keyboard
shortcuts, and will find the best choice for them.
7. Spreadsheets & Databases­ Spreadsheets were the killer application that got a lot of businesses to
pony up big bucks for a PC in the early 1980s. Spreadsheets offer incredibly powerful analysis
possibilities… if you know how to use them for more than storing the holiday card address list. Being able
to use formulas, references and macros can turn a “grid of numbers” into actionable info in the hands of
the right person. Students and teachers need to understand how spreadsheets can be used across the
curriculum as a tool to gather, sort, filter, calculate and analyze any type of data not just numbers.
Whether it is a phone number, bank account, list of available items in an online store, library catalog,
employee record, etc. databases play an important role in many aspects of our daily lives. Databases store
information arranged for ease and speed of search and retrieval. They can store very large amounts of
data. Just as in spreadsheets, databases can also be used to sort, filter, organize and analyze information.
3
8. Word Processing­ Word processing is one of the oldest uses for a computer. And it continues to be
extremely important, even though in many ways its functions have been put into other applications. (For
example, people may write more emails than documents, but the task is nearly identical.) It is tough to
claim to be computer literate if the basic functions of word processing — like spell check, table creation,
and working with headers — are outside your capabilities.
9. Copyright, Citing Sources and Plagiarism­ Students need to understand copyright laws and rules,
how to cite a resource, and how to integrate someone else's work into their own work properly.
10. Presentations­ More than just words and pictures, a good presentation can pack more punch than
a simple document. Once a picture was worth a thousand words, today we can also add video, audio,
animation and simulations to our presentation. Presentations can be active, where the viewer determines
the content based on their selections.
11. e­mail, Internet & Social Networking Etiquette and Safety­ In an increasingly connected world
it is imperative that you are an effective, efficient and safe user of the web. Are you sure you know what is
in that attachment you are emailing and who you are sending it to, what information is your smartphone
providing others, how you are being tracked on the web, how a web page really works, what the “Cloud” is
or that the photo file you are sharing has hidden information on your location? It is a dangerous world
out there! You absolutely must know how to protect yourself from attackers on the Internet and keep
your personal data private. Everything from knowing to check a link before you click it to verifying that
encryption is being used to transmit sensitive data to researching sites before giving them your personal
data are all critical skills for the modern computer user. If you do not know how to keep yourself safe, you
need to learn how.
12. Finding, Choosing, Using and/or Developing Software Apps, Online Tools & Simulations­
How to find, evaluate, and use apps for school and business. Also, how to find quality, free alternatives to
paid software, apps and services. Finding and using Web 2.0 Tools including- calculators, simulation tools
& other interactive tools. Usage of Simulation/Modeling software to observe, learn or interact with
manipulatives to better understand concepts and processes. Understand how to work with online tests,
surveys and other information gathering tools. Develop software programs, apps or robotics.
4
Evaluation Rubric
Levels
0­ None/Limited Proficiency­ Has little or no knowledge and/or unable to perform most tasks
I­ Introduction­ Beginner­ Can do very basic operations; can perform additional basic tasks with assistance.
D­ Developing­ Has varying skill set, but can do many basic tasks independently. Requires significant teacher
intervention for additional concepts, more advanced uses, correction of errors, etc.
R­ Reinforcement­ Knowledgeable. Has been exposed to both basic & more advanced tasks but has not
mastered skills
P­ Proficient­ Can do most operations independently; can perform advanced tasks with assistance. Has good
understanding of concepts. Can teach/assist most concepts to others
A­ Advanced/Highly Proficient­ Can do majority of operations independently, can perform very advanced tasks
with assistance. Has level of understanding of concepts that allows teaching/assisting others of any proficiency
level.
Scope & Sequence
Student computer skills will vary at any grade level, just as student achievement across the curriculum. Opportunities to
provide direct instruction will also vary depending on scheduling, other time constraints, ability to integrate technology into
other learning objectives and projects and other factors. Because of these factors it is difficult to have a hard and fast scope
and sequence and instead we will provide “bands” of skills and levels that may stretch across more than one grade level.
The scope and sequence objectives have been color coded to assist in visualization of both grade level proficiency and mode
of instruction (none, introductory, refinement, reinforcement and student independently utilizes tool or concept.)
Proficiently
Instructional Mode
0 None/Limited Proficiency­ Has little or no
None
Code
White
knowledge and/or unable to perform most tasks.
I Introduction­ Beginner can do very basic
Introduction of new concepts, tools
operations; can perform additional basic tasks with and skills.
assistance.
D Developing­ Learning new concepts/features. Has Requires significant teacher
varying skill set, but can do many basic tasks
independently.
Pink
Purple
intervention for additional concepts,
more advanced uses, correction of
errors, etc.
R Reinforcement­ Knowledgeable, has been exposed Reinforcement, needs projects and
Blue
P Proficient­ Can do most operations independently; Student works independently, may
Green
to both basic and more advanced tasks but has not tasks to reinforce skills and move
completely mastered skills.
toward proficiency.
can perform advanced tasks with assistance. Has require teacher answers to
good understanding of concepts. Can teach/assist challenges.
most concepts to others.
A Advanced/Highly Proficient­ Can do majority of
operations independently, can perform very
advanced tasks with assistance. Has level of
understanding of concepts that allows
teaching/assisting others of any proficiency level.
Student works independently, can find Gold
answers to challenges without
teacher intervention. Can
instruct/assist peers. Is on track for a
technology oriented future.
For a copy of the Scope & Sequence by Grade, visit- http://goo.gl/tcp2k
5
6
7
8
9
I.
Understanding Computer/Technology Hardware
a. Types of systems
i. Separate Components
1. Display/Monitor
2. Computing Device
a. Case containing
i. Power Supply
ii. Motherboard
iii. Memory (RAM)
iv. Hard Drive
v. Optical Drive (CD, DVD or BluRay)
b. External User Interface Devices
i. Keyboard
ii. Mouse or Trackball
iii. Touch Screen
c. Input and Output Connectors/Ports
i. Video Output
1. VGA or DVI (to monitor)
2. HDMI to TV
ii. USB (can serve multiple functions including printing, data
iii.
iv.
v.
vi.
transfer, charging, powering external devices, etc)
1. Available in three sizes/configurations
a. Standard
b. Mini
c. Micro
2. Available in multiple port speeds (1.1, 2.0 & 3.0) higher
speed devices are backward compatible with slower
port speeds.
Sound Output to Speakers/Headphone
Sound Input from External (or built in)
1. Microphone
2. Other audio device (MP3 player, TV, etc.)
Memory Card Readers/Storage (SD, Micro SD, Compact
Flash, etc.)
1. From Camera
2. Additional Storage of data
Network Connection (NIC)
1. Wired (CAT­5)
2. Wireless
d. Miscellaneous
10
i.
ii.
iii.
iv.
FireWire­ (similar to but not compatible with USB)
Serial/Parallel ports ­ (similar to but not compatible with USB)
Modem (phone line connections)
Built­in speakers
ii. All­in­one System
1. Have many of the above components built in
2. Most also include
a. Built­in battery
b. External Charger/Charging Cable
c. Built­in Cameras
d. Motions/Position Sensors
3. Types­
a. Laptops
b. Tablets
c. Smart Phones
d. Desktop Monitor/Computer all­in­one combinations
b. Identifying and adjusting hardware components­
i. Monitors/Displays
1. Understand screen resolution
2. Adjust settings
3. Safe cleaning
ii. System Settings
iii. Network/Wireless Connections
11
II.
Operating System (OS) Basics
a. What it is
i. Operating Systems are the software that allows all computing devices to operate.
(http://www.youtube.com/watch?v=MzVGL44eq9w)
ii. The OS controls all hardware and peripherals and allows you to run software
programs or Apps.
iii. Most also have firmware software that works with your OS. The firmware is usually
specific to your hardware in many cases the firmware is partly made up of the
computers ROM BIOS (Basic Input/Output System)
iv. Different types and versions of Operating Systems
1. Windows 8, Windows 7, Windows Vista, Windows XP, Windows 98, etc.
2. Mac
a. Mac­ OS X­ Tiger, Leopard, Snow Leopard, Lion, Mountain Lion, etc.
b. iPad, iPhone, iPod­ iOS 4, 5 , 6, etc.
3. Android­ Jelly Bean 4.1/4.2, Ice Cream Sandwich 4.0.x, Honeycomb 3.x &
Gingerbread 2.3.x , etc.
4. Linux (as know as Distros)­ Ubuntu, Fedora, Debian, CentOS, Redhat, etc.
5. Miscellaneous or derived from one of the above
a. Nook
b. Kindle
c. Chromium
d. RIM (Blackberry), Windows CE, Other proprietary systems
b. What you need to do to keep it running efficiently and safely
i. Keep it up to date
1. As hackers find vulnerabilities in an OS most manufacturers put out updates
to “patch” these holes.
2. Most OS allow you to set up automatic updates (turn them on!)
ii. Use the best version for your hardware. The newest OS is not always the best one
for you. Many new OSs are not supported by older hardware and may not support
older software
iii. Keep an emergency restart/image if you have an OS that stops working.
iv. Create and use a password to prevent unauthorized use of your device. This is
especially important with portable devices that may easily be lost or stolen.
v. Always keep your data files (documents, spreadsheets, etc.) backed up separately
(on another device or different place) because if the OS stops functioning you may
not have access to your data files and they may lost if the OS must be reinstalled.
vi. Always backup your data files before installing a major OS update or firmware
update to your device.
c. Understand how to change system settings for your device
12
d. Understand general commands that your OS supports and how to efficiently execute them
i. Cut, Copy & Paste
ii. Drag and drop
iii. File Copy, Moving and Deletion
iv. Undelete deleted items
v. Time & Date functions
vi. Installing/Uninstalling software programs and/or apps
vii. Know which software programs and/or apps are running and how to manage them
1. running Automatic startup with device power­on
2. Running in conjunction with other programs
3. Supplying personal information to others when you operate your device
e. Attaching peripheral devices, such as printers, storage devices, etc.
f. Understand and use OS optimization and/or protection software such as antivirus, disk
cleaning, defragmentation, etc.
g. Firmware updates­
i. Firmware updates can be used to provide new functionality from hardware.
ii. Because the firmware code is usually stored in Read Only Memory (ROM) updates
usually require overwriting original firmware
iii. Often known as “flashing”, an incomplete or incompatible update can render the
device nonfunctional (known as bricking) so great care should be used when
updating firmware.
iv. It often best left to trained users or professionals to update firmware.
v. Some manufacturers have integrated firmware updates into the devices and are
usually automated and require little or no user action.
13
III. Effective & Efficient Web Browsing­
a. .How Websites Work
i. A Web site needs four things:
1. A registered domain or subdomain address (URL)
2. A connection to the Internet and recognition by at least one DNS
3. Web Server with Web Server Software (Apache, ISS, etc.)
4. Content
ii. Web sites can be accessed by:
1. User entering the domain name into their browser’s address bar
2. User finds a link to a site through a Search Engine
3. User clicks on an HTML Link (see later section for more information on how
links work)
a. On a web page
b. In an e­mail
c. Within an electronic document (PDF, Presentation, etc.)
iii. Web Server/Software
1. Computers use a network, wired or wireless, to contact the web site’s server.
2. The host web server responds by sending an HTML page to the inquiring
computer.
3. The inquiring computer uses its browser to “read” the HTML coded file and
display a “web page”
4. The process is then repeated for each new page
b. Understand what a browser is and how it works
i. HTML
ii. Cache
iii. Cookies
iv. Plugins
v. Java and other scripting tools
c. Selecting and Maintaining an Internet Browser
i. Explore variety of available browsers
1. Mozilla FireFox
2. Google Chrome
3. Microsoft Internet Explorer (IE)
4. Apple Safari
ii. Keep your browser up­to­date. Out of date browsers are:
1. Susceptible to malicious software (viruses, spyware, trojans, etc.)
2. Cannot display newer pages properly
3. May not work with interactive (Web 2.0) sites
4. Are slower and may freeze often
5. Are unable to read latest version of HTML (5)
iii. In addition to keeping your browser up­to­date, it is imperative to also keep all
browser plug­ins up­to­date (Acrobat Reader, Shockwave, Flash, Java, etc.)
d. Learn about different sections of browser screen:
14
i. Menu & Settings
ii. Address Bar
iii. Search Bar
iv. Tabs
v. Status Bar
vi. Bookmarks/Favorites
vii. Add­on toolbars
e. Tips for navigating
i. Use Tabs features of most modern browsers
1. Allows you to have multiple web pages open simultaneously
2. Allows you easy switch between open pages
3. If you want to open a link on a page and do not want to close that page,
instead open the link in a “new tab” by right clicking the link.
4. You can have multiple tabs open as your homepage when browser is started
ii. Basic Controls
iii. Right Click for context sensitive menus
1. Right clicking elements on web page will bring up a context sensitive menu
2. The menu you see when you right click can vary considerably depending on..
3. Specific Browser being used
4. Version of the browser
5. Any AddOns/Extensions that have been installed
6. The web page you are
7. What you click on on the web page.
8. Keyboard shortcuts­ In addition to many of the usual keyboard shortcuts
(such as copy Ctrl­C and paste Ctrl­V) there are special shortcuts specifically
for use in your browser (see table below)
15
16
f. Gleaning­Gathering/Repurposing/Different formatting of web page information
i. Why the usual Copy/Paste routine often does not work as expected for web page
content
1. Content displayed on a web page is can be very different than what most
users are used to with other programs, such as word processing documents
2. It may be an image of words, not actual words
3. It usually contains HTML coding and HTML formatting information to properly
arrange words and numbers on a page
4. It may be an embedded component, such as PDF, image, spreadsheet,
video, flash, shockwave, etc.
5. It may be being generated “on­the­fly” by Java or other scripting
ii. Even if the Copy part works normally the resulting Pasting is not what you expected
or wanted
g. Keeping track of sites you have visited (the good, the bad and the ugly)
i. Good­ so you can return
1. Bookmarks/Favorites within the program
2. “Social” Bookmarking­ online bookmarks that follow you
3. Browsing History
a. Know how to see browsing history
b. Learn how to delete old history
ii. OK­ so sites know your desired preferences
1. Your default location
2. Saved usernames and passwords (that you wanted saved
iii. Not so good­ so sites can track you
1. Provide lots of targeted advertisements
2. Divert you to other sites
3. Gather information about you without you wanting them to
a. Browsing habits
b. Buying habits
c. Social Networking habits
d. Location
e. Usernames and/or passwords
17
h. Avoiding Internet Dangers
i. If it looks too be good to be true it probably is
ii. Page Redirects
iii. Know where you are going
1. Reading links before you click
2. Never type web addresses into your search bar instead of address bar
3. When it says you will be leaving a site, don’t answer yes unless you know
where you are going
iv. Turn­on Phishing warnings on your browser
v. Use a firewall
i. Telltale signs of Internet fraud
i. Phishing emails that look like they are official & warn of a problem with your
account, bill, etc...
1. Then take you to fake sites where they can steal personal and financial
information
2. Request for password or other personal information
ii. Warning signs of Phishing & Fraud emails
1.
2.
3.
4.
5.
6.
7.
Unsolicited offers
If it looks too be good to be true it probably is
Generic Salutations
Misspelling or grammar errors
Sound­like words
Invalid or no Security Certificates
Offshore or inaccurately described server locations
18
IV. Searching & Search Engines
a. Use the best Search Engine for the Job­
i. Use more than one search engine­ Every search engine is different, and will give
you different results. If you can't find what you're looking for quickly with the first
search engine that you try, there's plenty more out there including specialized
searches. For a very wide assortment of different Search Engines visit
www.searchfindknow.com/100­web­serachingsites.html
ii. Use Meta Searching­ One search engine is great, but a dozen search engines ­ at
one time ­ is even better.
iii. Don't even know where to start? Use Topic Indexes or Subject Directories to help
you get started or with younger students­ More like an Encyclopedia, Table of
Contents or Book Index. Some peoples personal searching preferences better
match method of starting with Indexes and then drilling down to more specific
subjects.
b. Know how to use the Features of your chosen search site
i. Visit the Help Page of the search engine for tips and tricks­ Know your favorite
search engines inside and out. It's easy to skim the surface of your favorite search
engines and only use the most prominent features; however, most search engines
have a wide variety of advanced search options, tools, and services that are only
available to those dedicated searchers that take the time to search them out. All of
these options are for your benefit ­ and can help make your searches more
productive.
ii. Learn how to set or change your preferences­ Search preferences can be set
globally on many search engines (safesearch, limit number of results, chose default
language, etc.)
iii. Auto Complete can speed things up.­ There are multiple types of Auto Complete­
some within search engines and some in your browser, history, recent searches,
etc.
iv. Turn off personalized searching and/or use a search site such as DevilFinder which
does not collect cookies.­ For example­ Google automatically pushes certain
content at you that it assumes you will be interested in. This is based on: 1. Where
you are (geographically) and 2. What you have searched for previously. For more
information visit­
http://support.google.com/websearch/bin/answer.py?hl=en&answer=35892
19
v. Three tools that are intended for people maintaining websites can also be useful to
searchers in identifying trends, alternative search terms, and research into key
players and competitors in a sector.­ Google Trends for Websites
http://trends.google.com/websites ­ looks at search trends for individual websites or
you can compare several websites. In addition it shows what people ’Also visited’
and ‘Also searched for’. Google Insights for Search
http://www.google.com/insights/search/ ­ advanced options for identifying search
trends including countries and categories.
vi. Use the country versions of Google for information that is country specific­ This will
ensure that the country’s local content will be given priority, although it might be in
the local language. Useful for companies and people who are based in or especially
active in a particular country, or to research holiday destinations. Use Google
followed by the standard ISO two letter country code, for example
http://www.google.de/ for Google Germany or http://www.google.no/ for Google
Norway.
vii. Keep up on changes in the Web & Search Engine World. Learn how search
engines work & about the search engine industry.­ Just as the Web itself, Search
Engines come and go and change features.
c. Use the Best Words in your search & know which words to avoid.
i. Use unique, specific terms. Use specific words rather than generic categories.­
ii.
iii.
iv.
v.
vi.
Whenever possible use "unique keys"/"golden words"
Never search for single words!­ You probably will not find what you want and will very
often be shocked by what you find!
Use scientific or trade names for items not common name or nicknames­ Use your
first couple of searches to find best words (one great place to find these words is
Wikipedia).
Carefully phrase your query­ The more specific your query is, the more success
you're likely to have. After all, "why is the sky blue" is easier to understand than "sky
blue question". For more information on how to craft a more specific query, read
article titled "Looking for a Specific Phrase" at
http://websearch.about.com/od/internetresearch/a/phrasesearch.htm.
Don’t use common words and punctuation­ Common terms like “a” and “the” are
called stop words and are usually ignored. Punctuation is also typically ignored. But
there are exceptions. Common words and punctuation marks should be used when
searching for a specific phrase inside quotes. There are cases when common
words like “the” are significant. For instance, “Raven” and “The Raven” return entirely
different results.
Realize that some words are not searched for­ Known as "Stop Words" certain
words are automatically excluded by search engines. These include words such as
“the”, “is”, “at”, “which” and “on”. (This is similar to the rules you learned for sorting
20
book titles). Use +, " " or operators such as Verbatim will force inclusion of these
words.
vii. Drop the suffixes­ It’s usually best to enter the base word so that you don’t exclude
relevant pages. For example, bird and not birds, walk and not walked. One
exception is if you are looking for sites that focus on the act of walking, enter the
whole term walking.
viii. Use synonyms or alternative search terms. ­ Be creative or use a thesaurus for
ideas. Type thesaurus in the search box to find an online thesaurus
d. Ctrl­F to find a word within the found page­ Depending on the specific browser you use the
Ctrl­F box will open in a different area of the page
e. Quickly & Effectively Review/Skim pages found.
i. Just because an item is listed first does not mean it is the best resource. ­ In fact, on
many sites the first 5 to 10 entries are there because their owners paid the search
engine company to put them there!
ii. Learn how to quickly skim a search engine’s description of a page, in the search
results­ Pay particular attention to the site address for clues. You can also install
browser add­ons or extensions to get thumbnail views of the first page of each site
found.
iii. Evaluate more promising result pages found ­ Use the Who, What, Why & When
Criteria and Hierarchy of Source criteria. The "smell test" and other evaluation
rubrics/schemes.
f. Learn & Use the Query Syntax of Search Engines
i. Although many search engines have added features to automatically help you get
the right combination of words you may be searching for knowing and using
Operators and other Syntax in your search give you the best results­ The easiest
way to use many special search features without know the proper syntax is to use a
site's "Advanced Search Page"
ii. Learn simple operators:
iii. The minus sign, ­ will exclude words, " " will give exact phrases, + will force inclusion
of "Stop Words" (see above) in your search and the ~ will include synonyms. AND
will give you results that include both words but OR will give you results with either
word. You can also use | in place of OR .
iv. Most complex operators can really help you refine a search, but they may be harder
to remember unless you use them often. A "cheat sheet" of operators is a quick way
to start incorporating them into your searching­
https://docs.google.com/spreadsheet/pub?key=0An6huy2QVY59dDVaa2U3R0Vae
WhKTHhSVi1yZWxQenc&output=html
g. Learn how to Glean, Bookmark & Find pages again.
21
i. Understand how to use Bookmarks or Favorites­ Many "Social Bookmarking"
online sites will allow you to have your bookmarks follow you to other computers or
share bookmarks with friends or students.
ii. Learn how to copy specific items, save text or data, etc.­ You may want to install
Browser Add­ons/Extensions to allow right click sensitive copying menus.
iii. Understand how to paste the information you have copied into your own
documents.­ Copying and pasting tables into spreadsheets is a very good tool to
understand, as it will allow you to analyze, sort, filter or do calculations on the
information.
iv. Understand how to use browser history to find pages you have already visited
h. Use the Invisible Web
i. Understand that many resources are not found by traditional search engines­
Invisible Web Directory: Many individuals and institutions have put together invisible
Web directories, which you can use as a jumping off point to surf the Invisible Web.
There are also specialized search tools for blogs, news, data, etc.
i. Learn about URLs & Directory Structure
i. Pay special attention to the addresses of sites­ especially the part following the
"dot" which gives some indication of the type of site (.com, .gov, .edu, .net, etc.)
ii. “Learn how to Climb Up & Down the Tree”
j. Practice RWS (Recursive Web Searching™) Techniques to get more from sites
(www.searchfindknow.com/rws.pdf)
22
23
24
V.
File/Document Management
a. What is a file?
b. Document versus Application versus Operating System files
i. Operating System Files ­ The files that allow a computing device to work (see
section on Operating Systems)
ii. Application files, also known as Programs, Executables or Apps
1. Application/Program files are further divided into:
a. Executables, the files that are “run” by the computer
b. Installers are files that copy applications and all of their associated
files onto the storage disk and integrate them with existing operating
system
c. Support files may...
i. Directly support the Application
ii. Integrate with OS
iii. Keep user preferences, provide shortcut access, etc.
iv. Interface with other programs
v. Connect to outside devices, network, Internet etc
vi. Support functions such as printing, backup, etc.
vii. Provide import/export capability
iii. Document Files
1. Contain user created content
a. Normal
b. Hidden­ Macros, Hidden Text or Cells
2. Contain information on formatting
a. Fonts, text attributes, paragraph styles, etc.
b. Backgrounds, borders, headers, footers, etc.
c. Page Layout
d. Printer Settings
3. Can contain historic information on the creation of the document
a. Undo info, revision history, etc.
b. File location on user device
c. Time stamps
d. Versions numbers
e. User that created file
f. Images can have GPS coordinates embedded telling where photo
was taken
4. Contain data associating them with specific applications (this test the
25
computer which default program to use to open them
c. Characteristics of all files
i.
ii.
iii.
iv.
v.
Name
Date
Size
File Type (association with program type)
Attributes (writable versus read only, etc)
1. Writable versus Non­Writable
a. Based on files properties
b. Based on storage media properties/state
c. Based on current or previous status
d. Already open on the computer
e. Locked files­ shared files already in use
f. On network and opened by another user
g. On local computer or network, currently in use by another program
vi. Hidden versus Non hidden
d. Creating a file
e. Saving/deleting files
i. Save versus Save As
ii. Overwriting an existing file with same name
f. Renaming a file
g. Copying & Deleting a file
h. Temporary files
i. Editing a file attachment from an e­mail
j. Recovering a deleted file
k. Storage
i. Directories versus Files
ii. File Hierarchy
1. Drive
2. Root Directory
3. Directory (Folder)
4. Sub­directory (Sub­folder)
5. File
iii. Files versus File Shortcuts
iv. Temporary storage (working copies)
v. Drive Letters
1. Non­removable Storage
26
2. Hard Drive (Hard Disk)
3. Removable Storage Media
l. Network Storage (Mapped Drives)
i. Authentication/Log In
ii. Privileges
iii. Access
iv. Read
v. Create New (Write)
vi. Change (Write to an existing file and save changes)
vii. Local Access versus Internet Worldwide Access (Cloud Storage)
m. File Transfer
i. Copy to another device or removable media
ii. Copy vs. Move
iii. saving email attachments
iv. Internet / Web Page
a. File downloading
b. File uploading
v. Peer­to­Peer file sharing
vi. Risks associated with file transfer
1. Lose
2. Interception (theft)
3. Corruption
4. accidental
5. vandalism
6. Malicious (attachment or embedding)
7. Viruses
8. Trojans
9. S.A.M. (Spyware, Adware & Malware)
n. Safety in Document/File Storage
i. Damaged Media
1. Physical
2. Magnetic
3. Electronic
ii. Lost media
iii. Theft and Privacy
iv. Backing Up files
27
1.
2.
3.
4.
Copies
On same computer or storage media
On separate computer or media, but located in same building
Off site
v. Backup Types
1. "Complete copy of all documents (don't forget application add­ons such as
bookmarks/favorite, address books, etc.)
2. Incremental backup­ only files that have changed since last backup
3. Multiple version copies of the same document
o. Recovering lost data
i. Reversion to Previous Version(s) such as in Google Docs
ii. Undelete
1. During copying or moving files­ use Ctrl­Z (undo)
2. Restore from Trash­ only effective if trash has not been emptied
3. Recover accidentally deleted files using special software required
4. Nefarious Recovery of Data
5. Even files that have been deleted can be recovered with special software
p. Documents often contain hidden information
i. History of changes
ii. Information removed in editing process
iii. Graphics files (Pictures, PDFs, etc.) can often be "undone" to reveal portions that
have been purposely "blacked­out" or covered.
28
VI. Using Productivity Tools
a. General Layout
i. Work Area­ the area where you enter and/or edit your text, images, etc.
ii. Menus & Commands
1. Dropdown Text Menu (“file menu”)
a. File Menu (Working with Documents)
i. Create new blank document
ii. Select from starting templates
iii. Open an existing document
iv. Save / SaveAs ­ save your work
v. Import/Export
b. Page Setup
c. Printing & Print Preview
d. Properties
e. User Settings
f. Recently opened documents
g. Exit program
h. Edit Menu
i. Copy/Paste
ii. Undo/Redo
iii. Find/Replace
i. View
j. Insert/Create
k. Format
l. Tools
m. Data/Tables
n. Help (usually also available with F1 key)
2. Toolbars/Icons/Buttons
a. Icon Shortcuts­
i. Small pictures that let you carry out menu functions with a
single click
ii. Often Customizable
iii. Which items appear
iv. Based on tasking you are currently doing
v. Based on user's preferences
b. Location on Tool Bar
c. Some toolbars can be "undocked" and floated in work area
29
iii. Status Bar (usually at bottom, gives status of what your are doing)
1. Contains information about...
a. The document you are working on
b. Number of total pages, current page number, location document
c. Worksheets
d. Current Font, styles, etc.
e. the status of keyboard (insert versus overwrite, etc.
b. Context Specific Menus (“right­click mouse menus”)
i. Usually brought up by a single right clicking of the mouse on an item or space in the
document (accessed differently in Macintosh OS)
ii. Menu items listed depend on what you can do to the item you clicked on
iii. To select menu item single left click of mouse
c. Keyboard, Mouse and Selecting/Highlighting Shortcuts­
i. Highlighting/Selecting tricks
1. Double click a word to highlight
2. Highlight first part of selection using mouse, then press shift and use the up
and down arrows or up and down keys to highlight the remainder of desired
selection
3. Selecting multiple items from a list
4. To select items that are together in a list­­ click on first item, press and hold
Shift key, then click on last item and then release Shift key
5. To select items spread throughout a list­­ click on first item, press and hold
Ctrl key, then click on each desired and then release Shift key
d. Keyboard Shortcuts­ If you do not know how to copy/paste without a mouse, you are not
computer literate. Sorry! Every operating system has some universal keyboard commands,
and while knowing them won’t add 30 minutes back into your day, it will take a lot of the
“friction” out of using a computer. Learning these commands is more a matter of routine
than anything else; a short tutorial done once a day for a week will probably be enough to
put you in the habit, and it will make you a happier user.
i. A combination of keys being pressed at same time (usually Alt or Crtl keys plus one
letter key)
ii. Many keyboard shortcuts are the same or very similar in most programs
iii. The two most important Keyboard Shortcuts are:
1. F1 key for Help.
2. Ctrl­Z keys to Undo
iv. Commonly used Shortcuts include: (see chart of Keyboard Shortcuts below)
v. Variety of left, right, single and double mouse clicks can provide a different actions
(see Context Specific Menus, above, for one example.)
30
Keyboard Shortcuts
Keyboard Shortcuts
31
VII.
Spreadsheets & Databases
a. Components of Spreadsheet Program
i. Menu/Toolbars
ii. Data & Formula Entry/Editing Bar
iii. Functions Bar or Button
iv. Worksheet Grid­
1. Cells
2. Rows & Columns
3. Ranges
v. Sheet Tabs – at the bottom of the sheet and tell the user which sheet you are
currently using. For example: Sheet 1, Sheet 3, or Vacation Budget, Tools Inventory
(you can change the names to something more meaningful)
b. Working with Cells, Rows, Columns, Ranges and Worksheets
i. Naming conventions
1. Cell References
a. Relative/Default Cell References (A9) will change if you add rows or
columns, copy or paste formulas, drag & drop or use auto­complete
b. Absolute References ($A$9) will remain the same even if copied &
pasted, move or auto­complete is used
c. Semi Absolute References­ one part of cell name is absolute while
the other is relative ($A9)
2. Range References
a. By cell names (A9:D24) indicate the first cell in upper left corner and
last cell in lower right corner
b. Ranges can also be given "text" names such as table, students,
grade­scale, etc.
3. Worksheets References
a. References to cells on another worksheet appear with a "!" in the
name (i.e. Sheet3!B2)
ii. Adding, Deleting and Moving­ Cells, Rows, Columns and Worksheets
iii. Cell “Handles” for Moving or Copying (extending range
iv. Resizing Columns/Rows
1. Using mouse, place cursor at the border of a column or row label and cursor
will change shape
2. To manually adjust hold down button & slide mouse left or right
3. To automatically resize to fit the widest item in a column double click
c. Data and Formula Entry
i. Adding data to cells­
32
1. Click in a cell & type in data. Press the Enter key or an arrow key to
complete. Pressing the ESC key cancels input
2. To enter numbers or symbols such as =, /, +, * or @ as text instead of as a
number value or formula start with the apostrophe symbol ( ' ) then type in the
desired text
ii. Simple formulas­
1. Choose cell you would like formula (it does not have to be adjacent to your
data cells
2. Click Formula Bar to edit entry or click in cell and retype corrected data
iii. Functions are premade formulas provided by spreadsheet to speed calculations­
1. Click Function button
2. Choose function
3. Enter requested information
d. Copying Pasting and/or Moving Data and/or Formulas
i. Simple copy & paste
1. Highlight item then use Ctrl­C or select "Edit...copy"
2. Can be used for single cells or entire ranges
3. Choose location you want and use Ctrl­V or Edit...paste
ii. Drag & Drop from one cell to another
iii. Paste Special
1. From within spreadsheet
2. From outside sources (web pages, word processing, etc .)
3. Values­ Pastes the results of Formulas or Functions as opposed to simple
paste which would paste the actual formula or function.
4. Formats­ Fonts, Attributes, Shading, etc.
5. Column Widths
6. Transpose­ turns a column of data into a row & visa­versa
iv. Auto Complete­
1. Used to extend a series of numbers, dates, etc.
2. Highlight cells at the beginning of a series. Move cursor to bottom right
corner & it will change shape. Click & hold mouse button while scrolling down
3. Can also "copy down" a formula or cell format
4. Can be used vertically or horizontally
33
e. Formatting­ Numbers
i. Number Type­ Do not manually format numbers instead use Num. Format
1. Currency provides "$"
2. Special­ brackets & dashes for Phone, Social Security #s & Zip Codes
3. Percentage accounts automatically for the x100 factor
4. Fraction converts & rounds decimals to fractions
ii. Formatting Alignment
1. Text Alignment Horizontal & Vertical Position in a cell & Amount of Indent
2. Vertical or Angled Text Orientation
3. Text Control
4. Wrap Text­ more than row per cell
f. Formatting Cells
i. Formatting­ Borders, Backgrounds & More
ii. Line Styles Chooser and Preset Borders
iii. Custom Borders­ toggle desired lines on or off by clicking
iv. Custom Presets
v. Patterns Tab­ Includes colors & background patterns
vi. Merge cells
vii. Protection Tab­ allows you to lock and/or hide cells
g. Conditional Formatting
i. In conditional formatting the characteristics of cells and their contents change based
on a specified criteria. Examples include:
1. Cell Value Is...
2.
3.
4.
5.
6.
Equal to
Not Equal to
Between
Greater or Less Than
Formula results specified return logical value of TRUE (1) or FALSE (0).
h. Formulas
i. Basic Math Operations
ii. Addition +
iii. Subtraction ­
iv. Multiplication *
v. Division /
vi. Multiple cells and math operations can be used in a formula
1. Order of Operations follows normal order of mathematics operation
2. Parentheses are used to alter order of operations
34
i. Functions are a special "shorthand" version of formulas or operations
i. Formulas and Functions can be combined.
ii. Multiple Functions can be combined
iii. Common Functions include: SUM, AVERAGE, MAX, COUNT, CONCATENATION,
VLOOKUP, IF Statement and COUNTIF
j. Entering Functions
i. Functions can be manually entered by typing an = sign then the function name
ii. Functions can be accessed via the = sign or fx on the Formula Bar, then using the
drop­down box to select the desired function
iii. Functions­ "More Functions"
1. Listed by Category
2. Function Names
3. Short Description
iv. Help lists general info about the function selected
v. As you click on each argument, help specific to that argument will appear.
k. Combining or Separating Data (especially text)
i. Concatenation­ combining information
ii. Text to Columns (Parsing)
1. Allows you to take multiple pieces of data & separate it into adjoining cells in
row
2. To determine where to "break" a cell's string of data the SS uses one of two
methods:
a. Fixed Length (i.e. a break at every 10th character in the string)
b. Delimiting Characters
i. Most common delimiting characters:
ii. Comma (.csv)
iii. Tab (.txt)
iv. Semicolon
v. Space
vi. Many SS provide a "wizard" to walk you through Parsing
3. Many "tables" of data from web pages require Parsing to be useful in SS
4. Best rule­ avoid combining more than one piece of information in each cell,
but if you must, try to include a Delimiting character
5. Alternatively, functions­ LEFT, MID and/or RIGHT functions can be used to
return only the first, middle or last part of the string of data in a cell
iii. Extraction­ Left, Right or Mid
iv. VLookup­ finds data from list using a specific piece of data in cell
l. Sorting & Filtering
35
i. Sorting (Ordering)
1. Sorting is used to arrange data in a specified order based on the beginning
character(s) of one or more columns of cells
2. You can sort all data on a worksheet or any subset of data in an area of
contiguous cells.
3. You select the data to be sorted by highlighting all the cells
4. If your cells contain a header row, check the appropriate radio button in
sorting dialog box
5. It is very important that you include all the columns for a given row of data or
they will become "detached" and out of order (the key combination Ctrl­* will
select all the cells in a contiguous table)
ii. Filtering (Separating/Finding) displays only given set of rows (cells) based on a
specified criteria. There are two methods of filtering
1. Auto Filtering
a. Uses a header row or column labels
b. It can be toggled on or off from menu (DATA)
c. Small drop­down arrow lets you choose filtering criteria for one or
more columns
d. Only rows with matching data are displayed, all other rows are hidden.
2. Advanced Filtering uses three or more extra rows above your data where
filtering criteria is entered.
m. Charts & Graphs
i. Charts & Graphs can graphically display the relationships between various aspects
of your data
ii. Make it easier to spot trends or variations
iii. Creating a Graph
1. Select the data you want to display in your chart. Be sure to include the
relevant column and row labels
2. Click icon to start the Chart "wizard"
3.
4.
5.
6.
Select the type of chart you want (pie, bar, etc.)
Select how you want data plotted (based on rows or columns)
Add titles for chart, Category (X axis) & Value (Y axis)
Once the chart is created, you can tweak various aspects (colors, fonts,
sizing, etc.) by right click on that element
36
n. Printing Spreadsheets
i. Define area to be printed by highlighting the desired range; then from the menu go
to File...Print Area..Set Print Area.
ii. Change how SS prints on your page by going to File...Page Setup and/or use the
File...Print Preview
iii. Page Tab­ Change paper size, orientation, scaling
iv. Header Tab­ Setup items to print in header or footer of each page
v. Sheet Tab­ Set print area, set label row(s) or column(s) to repeat on each printed
page
vi. You can also use many of the AutoFormat function and Styles to assist in preparing
your SS for printing (both are found under Formatting menu)
o. Page & Cell Protection
i. Locking & Unlocking Cells
ii. Protecting and Unprotecting Worksheets
p. Import / Exporting
i. Importing
1. By opening a spreadsheet file created with another program
2. By copying & pasting from another open spreadsheet
3. By copying & pasting from a word processing or other type of document
4. Gleaning­ See section below
ii. Exporting
1. By saving a spreadsheet to another spreadsheet program's file format
2. By copying & pasting from an open spreadsheet into word processing or
other type of document
3. By exporting as one of the "Common Data File Formats" that most
spreadsheet and many other non spreadsheet programs, such as
Databases, can read
a. Text file with fixed width formatting
b. Text file with delimiting character
i. CSV­ uses commas
ii. Text­ uses tabs
c. Database formats
37
iii. Gleaning­ taking information from a web page, PDF or other document and
converting into a spreadsheet
1. Discuss potential problems of converting
2. Use necessary techniques including, but not limited to
a. Copying
b. Pasting Special
c. Transposing
d. Text to Columns
e. Concatenation
f. Functions
q. Macros­ Allow advanced functions and repetitive operations to be automated (see below)
i. Define Macro
ii. Create a simple macro
iii. Record a macro
iv. Run the macro to check its operation
v. Edit an existing macro
r. Window View
i. Freeze Panes­ Allows you to scroll up/down or right/left through SS while the column
and/or row labels remain in place
ii. Set by clicking in a cell at point of the first column or row you want to scroll (to right of
column(s) or below row(s) you want frozen)
iii. Click Window ... Freeze
iv. Split Frames creates two frames where you can focus on two different areas of the
same SS simultaneously
38
s.
Databases (dB)
i. Types­ There are several types of databases that can be used in real­world
scenarios. The most common are­­
1. Flat­file databases are generally plain text files that can be used by local
applications to store data.
2. Relational database are databases with related tables of information. Each
table has a number of columns or attributes and a set of records or rows.
Relational databases are more popular because of their scalability,
performance and ease of use.
t. Components of Databases
i. Database Management System (DBMS)
ii. Collection of structured data
iii. Tables for organizing data
iv. Schema for defining table relationships
v. Queries
vi. Reports
vii. Links to other programs, that provide or use data from dB (Front­end)
u. Data Structure is based on records, fields and files
i. Record­ is a group of information (fields) based on a single item or object in dB
ii. Field­ is a named component of each aspect of a record. Most records have
multiple fields
iii. Files­ are collections of records
v. Field Characteristics­
i. Type of information being stored
1. Text (also know as Character, Alpha, Alpha Numeric or String)
2. Number (aka Numeric)
3. Record Number (aka AutoNumber)
4. Date (Date/Time, Time or Timestamp)
5. Logical (aka Boolean­­ True/False, Yes/No, On/Off, etc.)
6. Currency
7. Memo
8. Binary
ii. Special Types of information storage
1. Calculated (Autoincrement)
2. OLE Object (document, spreadsheet, picture, audio, video, etc.)
3. Hyperlink
4. Key (dB Key, GUID, UUID, Lookup Wizard)
39
iii. Field Length (number of characters)
iv. Validation
1. Required versus Optional
2. Characters (information) allowed in specific fields
3. Duplicate Values Rules­ Allowed versus Not Allowed
v. Locks
vi. Hidden versus Visible
w. Database Table & Schema
i. A table is responsible for storing data in the database.
ii. Database tables consist of rows and columns.
iii. A row contains each record in the table
iv. A column is responsible for defining the type of data that goes into each cell at the
intersection with a row.
v. In a relational database there is a schema which defines the tables, the fields in
each table, and the relationships between fields and tables.
x. Queries
i. A query is a question to the database, such as: “What is the zip code for a specific
town in a specific state?” “List all history teachers that also teach government”, “List
all male students with first name beginning with “J”. etc.” The answers to each of
these queries will be a relation.
ii. Databases have their own programing language and syntax for posing a query. One
example is the very popular SQL (Structured Query Language).
iii. A query is usually made up with three components:
1. Select list (aka SELECT)
2. Range or Data Tables being searched (aka FROM)
3. Filtering Criteria (aka WHERE)
iv. Some DBMS also have special wizards or tools to more easily create queries
without in depth understanding of query syntax
v. Queries via a Front­end
1. Queries can also be generated on a website and then transferred to the dB
via Front­end program such as PHP
2. Queries can also be generated via other software programs
vi. The results of a query are called a record set and can be expressed as a Report,
Form (cross tab), Chart or HTML Table.
40
y. Databases versus Spreadsheets
i. Spreadsheet Pros­
1. Are usually much quicker and easier to setup and use.
2. Are usually much quicker and easier at solving calculations
3. Have a wider range of functions easily accessed by user
ii. Database Pros­
1. Allow much larger sets of data
2. Can keep the data isolated from the end users, making multi­person use
safer as data cannot be compromised. A spreadsheet is edited directly by
people while a database is accessed by applications that enter and modify
data.
3. Are usually much faster at manipulating large amounts of data
4. Greater latitude in defining relationships between multiple sets of data
5. Allow easier and faster bulk updates
6. Provide more powerful tools for data entry
a. Validation
b. Autoincrement
c. Time Stamps
d. ID of person entering data
e. Autolookup of field information based on previous field entry (i.e.
entering zip code may autofill of city and state fields)
z. Data interchange between Spreadsheets and Databases
i. Import/Export
ii. Automated connectivity with tools such as ODBC (Open DataBase Connectivity)
iii. Use of API (Application Programming Interface), a protocol intended to be used as
aa.
an interface by software components to communicate.
Specialized Spreadsheets & Databases
i. Online Forms
1. Google Forms­
https://docs.google.com/a/mogadore.net/document/d/15i1AamaA_47cI­9Wc
9Rw_A­Tr7h6yM0lp­xofJImgzI/edit?hl=en&forcehl=1
2. Web Script based
a. MySQL/PHP based
b. e Commerce sites
c. Commercial packages
41
Keyboard Shortcuts for Excel & Most Spreadsheets
Keys
Action
Enter
Move to next cell down and/or complete function
Tab
Move to next cell to right
ESC
Stops data enter or change in a cell and reverts to original contents
Arrows
Move up, down, right or left
Ctrl+Z
Undo
Ctrl+A
Select All
Ctrl+*
Select all cells in a contiguous rectangle
Ctrl+B
Bold
Ctrl+D
Fill Down
Ctrl+F
Find
Ctrl+G
Goto
Ctrl+K
Insert Hyperlink
Ctrl+N
New Workbook
Ctrl+S
Save
Ctrl W
Close
Ctrl+:
Insert Current Time
Ctrl+;
Insert Current Date
Ctrl+1
Format cells dialog box
F4
Repeat last action
F7
Spell check
F9
Recalculate all workbooks
Ctrl + Shift +F3
Shift+F10
VIII.
Create name by using names of row and column labels
Display shortcut menu
Word Processing
42
a.
Create a variety of documents including the following types:
i. Short story
ii. Newsletter
iii. Menu or phone list
iv. Letter
v. Envelope
vi. Labels
vii. Brochure
b.
Your Word Processor is not a typewriter
i.
Many previous users of typewriters continue to carry for principals designed for
typewriting.
ii.
Even people that have never used a typewriter continue to follow these principles,
because that is what they have been erroneously taught.
iii.
Many of the rules of typewriting were actually functions of the limitations of the typewriter.
For example typewriters had only one font and each character typed took up the same
amount of horizontal space on a page.
c.
Line Wrap­
i.
ii.
Do not press the Return Key at end of each line.
Allow automatic line wrap. Do not use the Enter or Return Key at end of line unless
starting a new paragraph
d.
Double Spacing­
i.
ii.
Do not press the Return Key at end of each line twice
Change Paragraph Style or other similar setting, change setting for "Line Spacing" to
Double. Allow automatic line wrap. Do not use Enter or Return Key at end of line unless
you are starting a new paragraph.
e.
Numbered List or Outline
i.
ii.
Do not type a digit, then a period and then a space; repeating for each line
Change Text Style­ Use Numbered List Style or desired Outline Style. Both allow easy
rearrangement, insertion and/or sorting of all lines of text and your numbering will be
automatic
f.
Multi­column Lists (such menus, price lists, etc.)
i.
Do not use combination of Tabs and/or Spaces for horizontal alignment and Return key
for vertical alignment.
ii.
Do not use column function (it is for the type of columns found in newspapers or books
where text begins in one column and at the column wraps into next column).
43
iii.
Use Table function in your word processing program.
1.
You can choose to print borders or use no borders and people will not know how
you got everything placed just right!
2.
By using tables you can easily change font size, entered text or number of
columns or rows.
g.
Placing Text a specific point in document (outside the body of the text.
i.
Do not use combination of Tabs and/or Spaces for horizontal alignment and Return key
for vertical alignment
ii.
h.
Depending on your specific needs use Text Box and/or Table function.
Punctuation
i.
Do not use 2 spaces following periods or question marks. Two spaces were needed with
typewriter to create the special offset look of sentence break because each character
typed took up the same amount of horizontal space on a page.
ii.
Only one space is necessary following periods or question marks. The proportional text
automatically offsets the punctuation marks so no second space is necessary
i.
Emphasis or special characters
i.
Do not use Underling (type row of _ _ _under text) to emphasize text or replace italics.
This was done on typewriter because italics or special characters were not possible.
ii.
Use Text Attributes or Styles to convey special meanings:
1.
2.
3.
Bold or Underline­ to emphasize text
Italics­ for italicized text (such as book titles).
Sub or Supra Script, for formulas or chemical equations. (For complicated math
formulas you may want to use “equation editor” feature.)
4.
5.
Strike­thru, etc..­ use specific built in text functions.
Special Characters­ Use "Keycaps" Characters or Alt­xxx for number code of
special characters.
j.
Inserting and Editing Objects into your document
i.
ii.
Header/Footers
Pictures
1.
2.
3.
Clipart
From your own file
From web
iii. Text
iv. Page Numbers
v. Symbols and special characters
vi. Equation editor
vii. Word Art
viii. Documents, spreadsheets and other program outputs
44
k.
Formatting
i.
ii.
iii.
iv.
v.
Text Styles
Alignment
Paragraph Styles
Line Spacing
List Styles
1.
2.
3.
l.
Bullets
Numbered Lists
Outlining
Learn to use the extra features
i.
Spell Checker
1.
2.
3.
Autocorrection & Autotext
Glossary Expansion
Customizing the dictionary
ii. Find and Replace­ not only words but formatting
iii. Adding/Editing­ Hyperlinks
iv. Table of Contents
v. Themes, Backgrounds, Borders, etc.
vi. Booklet Creation
vii. Word and Letter Count
m. Methods of distribution
i. Printing
ii. Sharing electronically for collaboration
iii. Booklet printing
iv. PDF creation
v. Saved file formats
1. Text
2. Rich Text Format (.rtf.) a nearly universal word processing format
3. Proprietary (.doc, .docx, .wps, etc)
a. Compatibility
b. Conversion
vi. Publishing to web
1. Converting to HTML
2. Embedding in web page
3. As email attachments (see section “e­mail, Internet & Social Networking Etiquette
and Safety)
45
IX. Copyright, Citing Sources and Plagiarism
a. See Resources section for more on teaching about copyright & plagiarism
b. What is Plagiarism?
c. Not always “Black & White” often extremely “Gray & Fuzzy”
i. Definitions of Plagiarize
1. 1. From the Free Dictionary ("The Free Dictionary." The Free Dictionary. Farlex,
Inc., Web. 1 Jan 2010. <http://www.tfd.com/plagiarize>.) a. To use and pass off
(the ideas or writings of another) as one's own. b. To appropriate for use as
one's own passages or ideas from (another). c. To put forth as original to
oneself the ideas or words of another.
2.
From the Merriam­Webster Online Dictionary, to "plagiarize" means­­ a. to steal
and pass off (the ideas or words of another) as one's own b. to use (another's
production) without crediting the source c. to commit literary theft d. to present
as new and original an idea or product derived from an existing source.
d.
Types of Plagiarism ­ Anyone who has written or graded a paper knows that plagiarism is not
always a black and white issue. The boundary between plagiarism and research is often
unclear. Learning to recognize the various forms of plagiarism, especially the more ambiguous
ones, is an important step towards effective prevention. Many people think of plagiarism as
copying another's work, or borrowing someone else's original ideas. But terms like "copying"
and "borrowing" can disguise the seriousness of the offense (list below taken partially from
http://plagiarism.org/plagiarism­101/types­of­plagiarism):
i. Sources Not Cited
1. The Ghost Writer or Clone­ The writer turns in another's work, word­for­word,
as his or her own.
2.
The Photocopy or “Ctrl­C”­ The writer copies significant portions of text
straight from a single source, without alteration.
3.
The Potluck Paper or Remix­ The writer tries to disguise plagiarism by
copying from several different sources, tweaking sentences to make them fit
together while retaining most of the original phrasing.
4.
The Poor Disguise or Find­Replace­ Although the writer has retained the
essential content of the source, he or she has altered the paper's appearance
slightly by changing key words and phrases.
5.
The Labor of Laziness or Mashup­ The writer takes the time to paraphrase
most of the paper from other sources and make it all fit together, instead of
spending the same effort on original work.
6.
The Self­Stealer or Recycler­ The writer borrows generously from his or her
previous work, violating policies concerning the expectation of originality adopted
by most academic institutions
46
ii. Sources Cited (But Still Plagiarized)
1. The Forgotten Footnote ­ The writer mentions an author's name for a source,
but neglects to include specific information on the location of the material
referenced. This often masks other forms of plagiarism by obscuring source
locations
2.
The Misinformer or “404 Error”­ The writer provides inaccurate information
regarding the sources, making it impossible to find them.
3.
The Too Perfect Paraphrase or ReTweet­ The writer properly cites a source,
but neglects to put in quotation marks text that has been copied word­for­word, or
close to it. Although attributing the basic ideas to the source, the writer is falsely
claiming original presentation and interpretation of the information.
4.
The Resourceful Citer or Aggregator­ The writer properly cites all sources,
paraphrasing and using quotations appropriately. The catch? The paper contains
almost no original work! It is sometimes difficult to spot this form of plagiarism
because it looks like any other well researched document.
5.
The Perfect Crime or Hybrid Well, we all know it doesn't exist. In this case, the
writer properly quotes and cites sources in some places, but goes on to
paraphrase other arguments from those sources without citation. This way, the
writer tries to pass off the paraphrased material as his or her own analysis of the
cited material.
e.
Plagiarism & The Internet
i.
The Internet makes it both easier to commit and catch plagiarism
1.
2.
Has given students mixed messages on what is property
Citation of Internet resources is still "murky"
a.
b.
c.
Confusing
Multiple ways with minimal standardization
Often does not take into account the very nature of information on the
Internet
i.
ii.
iii.
iv.
Different writing style
Fast and ever changing
Multiple authors
Hard to determine qualifications of presenters of information and
validity of information presented, etc.
v.
Takes very little money to "publish" which can contribute to
questionable authority of authors
vi. Often more "visual" than "textual"­­ Videos, Sounds, Speech,
vii. Animation's, Hyperlinks etc.
3.
f.
Copyright Law
i.
What is necessary to copyright an item
47
ii.
iii.
iv.
v.
How long is the copyright in effect
What can and cannot be copyrighted
Differences between trademark, patent and copyright
What is fair use
48
X.
Presentations
a.
Types of Presentations
i.
Passive Learner
1.
2.
3.
4.
5.
ii.
Online Web 2.0 Tool (Prezi, etc)
Video/Animations
Podcast
Interactive Whiteboard
Active Learner
1.
2.
3.
4.
5.
b.
Slide Show (PowerPoint, Google Docs, etc)
Nonlinear (use of hyperlinked pages, based on user responses, etc.)
Apps
Online Simulations
Virtual Reality, role playing or other gaming
Interactive Whiteboard
Slideshows
i.
ii.
iii.
iv.
Do research
Collect information
Create new presentation from scratch or template
Create Slides with­­
1. Variety of new slides with text, photos, charts, etc.
2. Embedded content­ web links, video, audio, etc.
v. Editing
1. Edit, rearrange and tweak text and information
2. Format slides, fonts, transitions, etc.
vi. Present show
vii. Create sharable copies of show
1. “Pack­and­Go”
2. HTML
c. Create a presentation using an online Web 2.0 tools (Prezi, etc)
49
d. Create a video presentation
i. Outline project
ii. Write and edit
1. Story­board or outline
2. Script
iii. Shoot planned video clips
iv. Edit shot video clips into “chapters”
v. Add/Edit
1. Sound
a. Dialogue
b. Voice over narration
c. Sound effects
2. Captioning
a. Titles
b. Subtitles
c. Credits
vi. Finalize video
1. Combine chapters
2. Create final recording
3. Burn to DVD or upload to video server or a web site
e. Create Podcast
i. Do research
ii. Write and edit
1. Outline
2. Script
iii. Record and edit script
iv. Add sound effects, music, etc.
v. Edit final recording
vi. Post to web
f. Media Literacy
g. Creation & Editing of Original Media
i. Still Photography
ii. Basic of Photography
1. Composition
2. Lighting
3. Shutter Speed
50
4. ISO
5. Aperture
iii. Video Recording
iv. Audio Recording
1. Spoken Word
2. Recorded Music
v. Drawing/Illustration
51
XI. e­mail, Internet & Social Networking Etiquette and Safety
a. Know Who Are You Sending It To and What You are Actually Sending­
i. Be sure you know who are really sending mail to
1. Know how of following work and which to use when­
a. to: to a specific recipient
b. cc: to more than one recipient, but all recipients are aware of who
else the message was addressed to (all addresses appears)
c. bcc: to more than one recipient, but all recipients are unaware of who
else the message was addressed to (only recipients address
appears)
2. Do not share other’s email addresses with your sent emails by using bcc: to
prevent address harvesting
3. Reply vs. Reply All
4. Double check message & address before hitting send. There is no way to
get it back!
a. Misspellings of user/address
b. Similar looking addressees
c. Other addresses included in cc: & bcc:
5. Reply to unsolicited­­ beware of Phishing scheme & Spoofed addresses.
ii. Be sure you really know what you are sending
1. e­mail Header information­ Domains, servers, timestamp, smps, etc.
2. Secondary information in attached documents
a. Spreadsheets
i. Additional worksheets
ii. Hidden cells of a spreadsheet
iii. Links to other docs
b. Embed information in documents & graphics
i. Undo information
ii. Redacted PDF
iii. Masked graphics
52
3. Bad Taste / Annoying / Complicating
a. Out of Office Replies
b. Fancy formatting of email
c. “Novels instead of notes”
d. Using an attachment when the information could have easily been
pasted directly into the body of the email
e. Proprietary attachments (i.e. Office 2007 or 2010 .docx, Works .wps,
Visio diagrams, AutoCad drawings, etc.)
b. If you receive an email to “correct an error with your account” or similar problem
i. Do not click on included links, instead go to your browser and go to the bank,
PayPal or other companies web site by typing in address. Although the link in the
email may look like it will take you to right place closer evaluation of the actual
hyperlinked address may be very different!
ii. Never give responds to an unsolicited email asking for passwords, user names,
personal, bank or other sensitive information.
c. Never agree to meet, someone you do not know, in­person based solely on email or web
invitation
d. Offers of FREE money, securities or other items are almost always scams (often referred
to as “Nigerian Bank” scams)
e. Never install unknown software from an email link.
f. Digital Literacy and Citizenship Classroom Curriculum Scope & Sequence­
http://www.commonsensemedia.org/educators/scope­and­sequence
53
Finding, Choosing, Using and/or Developing Software
Apps, Online Tools & Simulations
XII.
a.
Types of Programs and Apps based on cost
i.
Commercial
1.
2.
3.
4.
Full paid version
Subscription
Volume Licensing
Upgrades
a.
b.
5.
6.
7.
Same manufacturer
Competitive upgrades from other manufacturers
Discounted versions, such as Academic
Light Versions
Viewer Only versions­ does not let you create new work only allows you to open
documents previously created with the software.
8. Bundled with hardware
9. Demos
ii. OpenSource
1. Both software and source code are made available for free
2. End users are not only allowed to use the software, but can also use
iii.
iv.
v.
modified source code versions and often individual components of source
code
3. OpenSource provider may place some restrictions on usE. These may
include not for commercial use, not for resale, no deconstruction of source
code to use only specific components, etc.
Free­ although OpenSource software is free, Free software may or may not be
Open Source. Often the source code is not made available.
Shareware­ software can be tried and if users wants to continue to use it or wants
access to all features they must register and pay for software
Adware­ software is free but end user is show periodic ads within software. These
ads provide revenue to software company. A similar example is seen in software
with the Amazon Kindle, where user must pay additional fee to have OS be ad free.
Donationware­ software is free, but owner will accept donations from users
vi.
vii. Nagware­ Software that keeps reminding the user that they want to choose to pay
for the software and if they continue to use free version they will continue to get
interruptions in form of “nags” or timeouts.
54
b. Types of Programs and Apps based on availability
i. Does not require installation, it is available as an online Internet application
ii. Comes preinstalled on most computers as part of the operating system. Including
ability to create a new file, rename a file, cut/copy/paste, rudimentary calculator,
rudimentary word processing, ability to read or play a CD/DVD, etc.
iii. Requires installation on a specific type of computer with a specific operating system
iv. Requires installation on a specific type of computer with a specific version number
of a specific operating system
v. Requires installation, but works almost universally on most computers with a variety
of operating systems supported
vi. Is installed on a device that is not a dedicated computer such as a smartphone,
e­reader or tablet.
c. Web 2.0 Online Tool Definition (do not require installation, are available as online Internet
applications)
i. Term used to describe web sites that use technology beyond the static pages of
earlier web sites.
ii. A Web 2.0 site may allow users to interact and collaborate with each other in a
social media dialogue as creators of user­generated content in a virtual community,
in contrast to websites where people are limited to the passive viewing of content.
iii. Examples of Web 2.0 include social networking sites, blogs, wikis, video sharing
sites, hosted services, online tools/applications, etc.
iv. Cloud based services, such as Google Docs, Microsoft 360, Carbonite Backup
Storage, etc.
d. Sample Categories of Web 2.0 Online Tools
i. Online Calculators­ used for wide variety of functions including but not limited to::
1. Mathematics, Geometry, Trigonometry
a. Standard math functions­ addition, subtraction, multiplication, division,
square root, exponents, fractions, etc.
b. Scientific Notation
c.
d.
e.
f.
g.
Graphing calculators
Triangle­ solving angles, length of sides, etc.
Circles­ solving area, circumference, radius, etc.
Area/Content­ perimeter, area, volume, etc.
Time­ seconds, minutes, hours, days, years, multiple dates, etc
2. Conversion (Units)
a. Temperature­ Celsius <­> Fahrenheit
55
b. Currency exchange rates
c. Measurement­
i. Metric<­> Imperial (aka­ Standard or English)
ii. Volumes­ teaspoon, tablespoon, cups ,quarts, etc.
iii. Feet, yards, inches, miles, etc.
d. Fractions <­> Decimals
3. Speciality
a. Finance­ interest, loans, mortgages, amortization, taxes, etc.
b. Calories, body mass index, etc.
c. Mileage
d. Holiday dates
e. Solar­ sun angle on specific days at specific locations
ii. Online displays of information based on user input or selection of specific criteria
1. Graphs & Charts
2. Timelines
3. Calendars
4. Travel Maps and Directions
5. Demographic Maps showing conditions or information about specific states,
countries, etc. (election results, languages spoken, average age of residents,
minerals resources, products produced, etc.)
6. Astronomy Sky Charts
7. Individually numbered available locations/seats on a plane, in a stadium or
theater, cruise ship, etc.
iii. Commerce
1.
2.
3.
4.
5.
6.
Buying or Selling of goods, services or information.
Acquiring Apps, Music or other data
Online Banking
Payment of fees (car and other vehicle licensing, user permits, etc.)
Online Income Tax Preparation
Online Voter registration
iv. Communications/Information/Data
1. Surveys
2. Blogs
3. Social Media
4. File Sharing
e. Simulations & Modeling Programs
i. Can be standard installed software but most are now web based
56
ii. Can include one or more of the following functions­
1. Provide visual display of a process
2. Allow manipulation of items by user
3. Allow experimentation and/or observation by user
4. Allow user to take on a role or to be present in a virtual location and be
represented by an avatar
5. Safely demonstrate principles and functions of processes and/or items that
are either too large, dangerous, involve large expenses, require travel to
remote destination, require different time periods, etc.
iii. A small sampling of Simulations and Modeling examples might include:
1. Simple Machines­ allows manipulating items that utilize concepts of the
lever, wheel, pulley, inclined plane, wedge and/or screw
2. Flight simulator allows user to experience flying a plane
3. Online chemistry set, that allows combination of different elements
4. Building and managing a model city, railroad, zoo, etc.
5. Visiting­
a. Deep ocean
b. Dinosaur in their natural environment
c. An ancient civilization
d. Other planets in solar system
6. Constructing and/or testing performance, strength and/or other attributes of­
a. Building
b. Bridge
c. Automobile
d. Airplane or Spacecraft
57
f. Accessibility­ two types:
i. Making sure that design of software and web sites are accessible by all users
including those with special needs. Examples include but are not limited to:
1. Ability to use audio reading software
2. Design of alternative methods for entering data or interacting with computer
3. See the U.S. Department of Justice’s “Technology and People with
Disabilities: The Current State of Federal Accessibility” for more
information.
ii. Special Software and/or special program functions designed specifically to assist
user with special needs. Examples include but are not limited to:
1. Text­to­speech
2. Speech­to­Text
3. Annotation software
4. Use of existing software program’s special features to enhance usability for
user requiring accommodations:
a. Changing of font size, style and/or color
b. Color highlighting tools
c. Keyboard Shortcuts
g. Developing and/or programing software, apps, micro­contolors, micro­computing devices
and/or robotics
i. Understand basics of how a software program is written and functions
ii. Create an App
1. Create a prototype or pseudo App utilizing diagramming software,
spreadsheet or other tools
2. Convert a Java or other web script into an App
3. Write an App in a programing language
iii. Utilize a micro­computer, micro­controller or embedded computing device (Arduino,
Basic Stamp, PIC, etc.)
1. Program functions or use pre­built program to operate
2. Design or use a pre­designed hardware interface to utilize the device to
perform a task.
iv. Robotics
1.
2.
3.
4.
Understand concept of robotics
Program a pre­built robotic device to perform an action
Build a robotic device utilize available modules
Design your own robotic device
58
h. Online Testing (see “Computer­Based Assessment: "Intermediate Constraint" Questions
and Tasks for Technology Platforms” for more information)
i. Understand concept of “closed/secured” browser
ii. Navigation between screens
iii. Use of online calculators
iv. Viewing Presentation
1. Control­­ Start, Stop, Pause, Rewind, etc.
2. Go to “Full Screen” view and return to normal view
v. “Answering” questions­
1. Selection of Multiple Choice
a. “Radio buttons” for selecting one item only
b. “Checkboxes” for selecting multiple choices for one questions
2. Selection/ Identification
a. Click on an object
b. “Lasso” multiple items
c. Shift­Click first and last item (in adjacent items)
d. Ctrl­Click to select non adjacent items
3. Reordering/ Rearrangement­
a. Arranging objects into specific positions by dragging with mouse
b. Numbering or lettering
4. Substitution/ Correction
5. Completion
a. Typing in a blank space
b. Typing in a text box
6. Construction
a. Moving “building blocks” into a desired shape/pattern
b. Drawing lines/objects to create shape/pattern
c. Copy/Paste “building blocks” from one place to another
7. Creation
a. Table of information
b. “Spreadsheet”
c. Outline
d. Brochure
e. Presentation
59
Resources
1. Digital Literacy and Citizenship Classroom Curriculum Scope & Sequence­
http://www.commonsensemedia.org/educators/scope­and­sequence
2. Searching, Advanced Searching, Recursive Web Searching, Information Literacy, Digital
Literacy & Media Literacy Resources­ www.SearchFindKnow.com
3. Web Literacy Standard a Map of Competencies and Skills from the Mozilla Foundation­
https://webmaker.org/standard
4. Pre­K­12 Technology Scope and Sequence . Generic version developed by My eCoach and
aligned to ISTE Standards and Performance Indicators for Students
http://www.my­ecoach.com/scope/intro.html
5. U.S. Department of Justice’s “Technology and People with Disabilities: The Current State
of Federal Accessibility”
6. Tech Writing Handbook­ "This handbook will teach you how to create everything from manuals
to work instructions. We’ll help you avoid the most common pitfalls of tech writing, from poor
planning to outdated publishing"­ from iFixIt
7. Purdue Online Writing Lab (OWL)­ Contextualizing Plagiarism
8. “Seven Outstanding sites for teaching Copyright”­
http://www.educatorstechnology.com/2012/07/7­outstanding­web­resources­for.html
9. The Ninja Program is a free program for students and educators to learn how to use
Google Apps for Education in a fun and social way. Study, take tests, earn badges, and
become a Ninja Master­­ http://www.ninjaprogram.com
10. Using Google Forms­ by Eric Curts­
https://docs.google.com/a/mogadore.net/document/d/15i1AamaA_47cI­9Wc9Rw_A­Tr7h6yM0lp­
xofJImgzI/edit?hl=en&forcehl=1
11. Computer­Based Assessment: "Intermediate Constraint" Questions and Tasks for Technology
Platforms” Kathleen Scalise, University of Oregon, June 2009 This website introduces a
taxonomy or categorization of 28 innovative item types useful in computer­based assessment.
The taxonomy describes "intermediate constraint" items. These item types have responses that
fall somewhere between fully constrained responses (i.e., the conventional multiple­choice
question) and fully constructed responses (i.e., the traditional essay).
12. 20 Technology Skills that Every Educator Should Have By Laura Turner­­
http://www.guide2digitallearning.com/tools_technologies/20_technology_skills_every_educator_s
hould_have
13. Stop just talking about 21st Century Skills, it time to be doing! A dozen things educators
need to do for today’s students- http://goo.gl/Mtlcq
60
*****************************************************************************************************
12 Things You Should Know to be Computer/Tech Literate
by Anthony A. Luscre is licensed under a
Creative Commons Attribution­NonCommercial­ShareAlike 3.0 Unported License.
Based on a work at www.searchfindknow.com.
2013 by Anthony A. Luscre ­
mo_luscre@mogadore.net or anthony@searchfindknow.com
Portions of the material on types of Plagiarism are from­
http://plagiarism.org/plagiarism­101/types­of­plagiarism
(In the interest of disseminating this information as widely as possible,
plagiarism.org grants all reprint and usage requests without the need to
obtain any further permission as long as the URL of the original article/information is cited.)
*****************************************************************************************************
61