Tuesday, December 18, 2007

Cover for Wednesday, 19th December

Scroll down for year 11 work!

Year 10 ICT - period 1
review add on marks - make sure that you have sorted out trouble shooting and health and safety. Have a look at ictgcse.com in the theory section for some ideas ...

Year 11 ICT period 3
Make sure that you have screenshotted all the evidence for settng up your database, INCLUDING setting up your forms.
Enter 15 records into your database - SENSIBLE names only.

Josh Houchin to sit at least 4 computers away from Matt Hayes - sorry guys - you both need to do some work!

Merry Christmas!

Thursday, November 15, 2007

7S cover

Task: Design a poster to promote sensible use of the internet

You may use publisher (or word if you have to!)

Remember not to include too much information - keep it simple.

You could talk about bullying, using it in lessons, what you can and can't look at etc.

DO NOT spend all your time making the background colourful - do the writing first!

Blogged with Flock

work for Thursday, 15th Nov

Cover for DP

Period 1 – 11C



Continue with coursework

Remember to use the mark sheet in shared
files (shared/ICT/GCSE ICT/Grades/coursework marks 2006-8.xls) to work out any
improvements or gaps that you need to fill in.

Jess D and Jess H:

Make sure that you use text fields not
lookups to start off with when you are providing evidence of your database
implementation – you will “discover” that you can use lookups later, once you
have “discovered” that you need a text field for phone number …


Matt H – concentrate on project 2 for now.


Josh houchin to sit away from Matt P and others, to allow him to concentrate on own work …

Sally and Beccy – we were talking about tests that you should do – have you actually tested that you can do your user

requirements yet? If not, then you should try to do the specific examples that
you gave.



Toby and Jake

Now that you are about to start setting up

your databases (compare your plans with the sample data structure in the design
folder in shared files for ideas on what to include), you’ll need to provide
evidence of setting up as you go along.

 

Go to Shared/ICT/GCSE ICT/project
2/implementation/implementation template.doc


READ THE INSTRUCTIONS! – you need to set up
your DB and provide evidence of what 
you  are doing using screenshots
and annotations. The foundation tasks are in red, and the higher tasks are in
blue.


Louise – make sure that you provide
evidence of the following when you et up your DB:

Setting field sizes

Setting validation

Creating queries


 Periods 2-4 Year 10s

Complete write up for Data protection act

and copyright act.

Go through mark sheet in shared files to ID
remaining tasks for improvement.


Dom Cowles, Owen Moseley and Oliver holtom:
concentrate on the improvements that we discussed in lessons over the past
couple of days. DO NOT start anything new until you are up to date.



Dom and Owen to sit by themselves without
opportunities for contact with others.



Research task (NOT FOR Dom, Owen and
Oliver!)



You’ll need to write up some advice for the
film club about security from online threats – first of all, you need to start
to get an idea of what threats are out there


 In a new word doc called “online threats”,

give definitions of the following:


  • Virus
  • Worm
  • Spam
  • Phishing
  • Spyware
  • Scumware
  • Adware
  • Zombie
  • Botnet
  • Denial of service attack
  • Social engineering
  • Trojan
  • Dialler
  • keylogger
  • blacklist
  • whitelist


 



 



 




Blogged with Flock

Monday, October 29, 2007

cover for DP Tuesday 30th October

8S1
As you are no doubt aware, we are launching a school website that has blogs, wikis and some networking - similar to sites like bebo in many ways (but I control it!)

Obviously, given some of the concerns that have been raised about these sorts of sites, we are not making it available online just yet - one of the prep activites is asking students to define what they consider acceptable ways to behave whilst using sites like this ...

Your task:

research online, discuss with friends and think yourselves how you feel students should behave.

Keywords for internet research: AUP, acceptable use, responsible etc

Once you have some ideas, create a powerpoint aimed at explaining to a year 7 audience what the rules are and why they should be followed. Remember - rules are not all about DON'T - try to come up with at least as many DO's as well!

Potential topics to cover:
respect for others
ownership of work
copyright
bullying
ofensive language
positive cooperation
collaboration


Year 10 ICT

For the second part of this project you have to produce a series of short essays/reports about different aspects of ICT.

Today I'd like to you to research the Data Protection Act

You need notes on this for 2 purposes:
1) As a set of revision notes for your exams (end of year 10, mocks and GCSE!)
As such, copy and paste just isn't good enough - you'll need, at the very least to include YOUR explanaitions of what the different parts actually mean ...

2) Tied in with this is the fact that you have to produce a guide for the film club on what the data protection act means for them - what can they and can't they do with the member details that they store. We'll be discussing this in more detail next lesson, but you need to make a start reviewing the notes that you made for part 1 (Above) and considering how they can be explained to someone your own age.

Try:

http://www.teach-ict.com/
http://www.ictgcse.com/

google for Data Protection Act / data protection registratar

Sunday, October 14, 2007

Cover for DP 15th October

All year 11 classes.


As some of you are aware, I went on a course last week run by the exam board on how to mark the coursework that you are working on at the moment. The key feature that they stared was that all evaluations (of suitability of software, hardware, database design, form design, report design mail merge template design etc) need to be related to the user requirements, so these need to be made far more specific…

Here are the things that you need to tweak urgently:

1) Make your user requirement statements more specific: e.g. “add a record” becomes “Mr Smith needs to be able to add member’s details when they join the club”; “change a record” becomes “Danny tells Mr Smith that he has a new mobile number. Mr Smith needs to update Danny’s records” etc.

2) If you are aiming for a C+ grade, you’ll need to add user requirements so that you can evaluate the forms and letters – the improvements that you have made all focus on making them look more professional etc, so you need to add a requirement for solution that you design to be professional looking and match the company/team colour schemes / logos etc

3) If you are going to recommend one PC over another based on the cost, you’ll need to add a user requirement that the system shouldn’t cost a lot …

4) If you have said that you want to be able to produce letters, you’ll need to include a printer in the spec that you produce. You’ll need to find a printer that prints only black and white and another that prints colour – explain which is the better, and why.

Letters to and from Mr Smith.

You’ll remember that I said that you are supposed to be doing this project for real – the moderator from the exam board has stated that you have to include evidence that Mr Smith replied to you in writing when you wrote to him asking for an appointment to discuss his current filing system.

To do:

Write a letter from Mr Smith to you, agreeing to meet with you on the date that you suggested and saying that he looks forward to discussing with you how you’ll be able to help him.

DO NOT write this in your template

Now – print this out and fold it as though it was going in an envelope. Add to your folder.

Wednesday, October 10, 2007

Cover for DP - Thursday 11th October

11C
Review "ICT and society" section of text book p.209+, answer questions: activity 3, page 217, case study p231-2, question 232-9 in word doc called "theory.doc"

Many of you have left your notes from yesterday on the desk - they are on the filing cabinet at the front of the room. It is certain (since I am writing it) that there will be questions in the Mock exam (in 2 months' time) on the impact of ICT on Society ...)

year 10 B,C,D

Ensure that all the gaps in the template are completed. if you "don't know what to do", try reading the instructions - it does help!

For evidence of different formatting techniques in MB 17-19, you need to show that you have used the master page to format the whole leaflet, tables to lay things out or styles to format your work. EXPLAIN what these techniques do and WHY you have used them.

Open a new internet connection
Go to drupaled/thsweb - this is the school blog/wiki software (Do NOT google for it - type it into your browser as you see it)
login using your school email number (2004xxx) and the password: pass

locate and subscribe to a group - I'll leave it to you to work out which one!
Find your first assignment and complete the tasks.

7S
create a powerpoint on the following topic:

What do you think the rules should be for using the internet in school?

Go to Start/my computer/shared/ict/year7ict/school rules.ppt

For each rule, say why you have you think that it is important

Format the slideshow for students your own age.

Make sure that it is easy to read - do NOT do really fancy backgrounds!

Save your work as"school rules" in your my documents/schoolwork/year 7/ict/ folder.

Thanks

DP

Thursday, October 04, 2007

Cover for DP

Thurs Period 1 9S

Continue with spreadsheet model from last lesson.

Todo:
Make sure that all data from info sheets 1-3 are entered – after each sheet is finished, the questions at the bottom need to be recorded on the Answer sheet document.

Once the model is complete, load the test sheet doc from the shared files. Record the answers next to the questions up to question 6.

At question 6, add the new data to the model, save it with a different name and repeat the first 6 questions – record your answers next to the previous answers for the first recording studio.


Thurs Period 2 10C


Review work so far – ensure that everything is complete. READ THE INSTRUCTIONS – they explain everything that you need to do!

Make sure that your leaflet is consistent – that means that the layout should be the same for every page, that you have used the same font, size and colour for the descriptions, titles etc.

You need print screens of 2 double pages – annotate to say what fonts etc you have used – read the instructions for more information!

Think back on our discussion about which web site is most suitable for you to use as a source of information:

Imdb.com (internet movie database)
Film distributor’s site
Blockbuster.co.uk

Who is the audience for each site? Do any of them have an audience in common with your leaflet? If so, explain why you think that this would make if a useful source of information.


Thurs Period 3 10D


Remind Dominic Cowles to go through his work updating the areas for improvement identified yesterday.

Review work so far – ensure that everything is complete. READ THE INSTRUCTIONS – they explain everything that you need to do!

Make sure that your leaflet is consistent – that means that the layout should be the same for every page, that you have used the same font, size and colour for the descriptions, titles etc.

You need print screens of 2 double pages – annotate to say what fonts etc you have used – read the instructions for more information!

Think back on our discussion about which web site is most suitable for you to use as a source of information:

Imdb.com (internet movie database)
Film distributor’s site
Blockbuster.co.uk

Who is the audience for each site? Do any of them have an audience in common with your leaflet? If so, explain why you think that this would make if a useful source of information.


Thurs Period 4 10C

Review work so far – ensure that everything is complete. READ THE INSTRUCTIONS – they explain everything that you need to do!

Make sure that your leaflet is consistent – that means that the layout should be the same for every page, that you have used the same font, size and colour for the descriptions, titles etc.

You need print screens of 2 double pages – annotate to say what fonts etc you have used – read the instructions for more information!

Think back on our discussion about which web site is most suitable for you to use as a source of information:

Imdb.com (internet movie database)
Film distributor’s site
Blockbuster.co.uk

Who is the audience for each site? Do any of them have an audience in common with your leaflet? If so, explain why you think that this would make if a useful source of information.



Thurs Period 5 10C

Create a new Word document called “Theory”

Save it in your GCSE ICT folder

You will need to get a copy of the ICT for You text book from the shelves at the back of the room. As I have mentioned before, you will have to do some theory exams – one at the end of year 10, your GCSE mock at Christmas in year 11, and your GCSE – we need to start putting together notes and doing work towards it!

Review chapter 1 – hardware and software.

You need to do:
activity 1 – to warm up your brains!
Activity 2 – starting to create a set of revision notes
Activity 3 – download, don’t draw a diag of the internals of a computer and annotate.

Web sites that you could use:

www.ictgcse.com

www.teach-ict.com

Wednesday, May 02, 2007

Blogging and acceptable behaviour on social networking sites


Over 200 students at Tenbury High School have taken part in discussions to come up with a set of guidelines for using social networking and blogging sites in school.

Please read them and think about what they imply – we hope that if the ideas come from students rather than from adults, there is a better chance that they will remember them (at least some of the time!).

At the bottom of this post there is the possibility of commenting on what we have been doing – please feel free to join in the debate.

Student ideas for acceptable use of online networking resources:

  • Anything that you put on the internet can be seen by anyone else who can get on the internet (including adults!)
    • Remember that this applies to:
      • personal details
      • postings about what you have done
      • where you go and what you do
      • photos about you and your friends
      • the language you use
      • what you say about others
  • Things that you post on the net can be there forever – even if you try to delete them!
  • Use private messaging for private comments – do not use publicly visible comments
  • Using offensive language directed at others can be hurtful and will result in punishments
  • People who are trying to insult you are just trying to show off – ignore them, or report the abuse
  • Websites have tools to let you report problems - use them!
  • Take responsibility for what you write – be prepared to defend or explain what you have written
  • Use sensible login details and keep your password safe
  • Be yourself – don’t pretend to be other people (it’s creepy!)
  • Think how you would feel if you were cyberbullied
  • Don’t just copy stuff of the internet and pass it off as your own.
  • Report abusive comments and things that you don’t think ought to be there
  • Treat people with respect. Do not use postings or comments to harm people or groups
  • Don’t abuse the system that you are using
To post a comment, please click on the link below.

Monday, January 15, 2007

Work for 9W

Go to google and use the define:keyword operator to research meanings for the following computer security related terms.

To do this type the word define, followed by a colon, followed by the word which you are looking for.:

Define:hacker

NOTE: There are no spaces on either side of the colon!

You will get a list of dictionary definitions of the word or phrase. Copy and a definition for each word/phrase in the following list into a word doc entitled

“Computer security”

Hacker
Virus
Trojan
Spyware
Scumware
Malware
Exploit
Spam
Adware
Firewall
Phishing
DDOS (distributed denial of service)
Zombie
Botnet

What advice would you give someone to make sure that they minimised the risk from these different threats?




Work for 10 B and C 15th January

Use text books (on window ledge by printer) and web resources:
www.Ictgcse.com
www.Teach-ict.com

… to review the following sections.

Hardware: Input and output

Use google and the define:keyword operator that we used to research security terms, work out what the following devices do. Group them into input devices (send info TO the computer) and output devices (get info FROM the computer)

Concept keyboard
Plotter
Graphics tablet
LED
Touchpad
Actuator
Scanner
LCD monitor
OMR reader
Touch screen
printer
Webcam
MICR reader
Speaker
Microphone
Joystick
Projector
Mouse
Thermistor
MIDI
Bar code reader


Databases review:

Define the following:
Database
Table
Record
Field
Data
information

Use chapter 31 from text books:
How big would 1 record of the table which you have just planned be?


Look at chpt 32: Questionnaires / data capture forms (DCF)

Design a DCF to collect membership details for the table which you have planned.


Work for 9T to follow

About Me

The one problem that I find as an ICT teacher is that all these kids get in the way of my interaction with the computers