1st High School of Xanthi, Greece – Documents about ICT and Web2.0 tools at our school

ICT & ETWINNING_OLY

ICT & ETWINNING

 INTRODUCTION

The modern classroom of the 21st century will no longer narrow spatial limits and characteristics, it is a space that includes differentiated learning groups learning everywhere, at home, in society and at school. The prospect is to be the space that will systematize and develops the knowledge students have / or tri while will create and manage new knowledge produced through social intercommunication of participants in teach communities (Anthony & Siskos, 2006; Arvanitis 2009).

“E-learning” refers more to a vision in which learning through technologies of Information and Communication Technology (ICT) is an integral component of education and training. The Spring Councils of Stockholm (2001) and Barcelona (2002) developed the conclusions of the Lisbon Council (2000) and confirmed the importance of improved and effective use of ICT for European knowledge society.

In this way, the digital culture becomes as important as the standard was (Classical) study of reading, writing and numeracy a century ago: without it,

citizens can participate fully in society and to acquire the skills and knowledge needed in the 21st century. The text of the European Union (2012), the skills required to develop pupils / or tri, to make them responsible and productive citizens in society entrepreneurship are among the other knowledge in ICT, in English, in synthetic speech output and mathematical logikokritiki thought.

NEED FOR ICT USE CHANGE ATTITUDES THROUGH LEARNING

ICT offer teachers and students information sources through communication, new ways of evaluation and self-evaluation and tools for expression, exploration, simulation and modeling phenomena. Also, the use of ICT can help students develop high-level cognitive skills (higher order cognitive skills), which enhance the learning process, such as the ability to solve problems, exploration and discovery options and multiple optical a cognitive theme, the reflection method and criteria for selection of the most appropriate, the possibility for communication and collaboration, and critical thinking and questioning (Steeples & Jones, 2002).

 ONLINE APPLICATIONS FROM DISTANCE COOPERATION

Students / or tri using technological applications, especially the internet, as authors blogs (blogs) and as co-authors in co-managed websites (Wiki’s) and other collaborative media will hold a major role in the new learning scheme

(Philip,2007). Collaborative websites, blogs and mikroistologia, virtual classes, educational simulations, training scenarios, educational games, asynchronous forum for communication, modern online chats and video conferences are point meeting of members and their ideas. In this way, communities of learning, which answered most of these tools or everything. Through the Internet learning communities and cooperation formed attitudes, values, opinions, new practices and feeling of ‘belonging’. Also, teachers collaborate more easily with colleagues from around the world collection and production of learning materials, and design but also in completing a course in different countries

 E-TWINNING – PLATFORM TWINSPACE – FUNCTIONS OF PLATFORM TO USING FOR THE CULTURE OF RELEVANT SKILLS

The full development potential of the Internet to improve access in education and training, and enhance the quality of learning is crucial importance for building a European knowledge society. The development of electronic twinning schools of elementary and secondary education and promoting teacher training (Twinning, 2005), aimed at strengthening and developing implementation of a network between schools, mainly through a European twinning project schools in order to make it possible for all schools in Europe to implement pedagogical partnerships with schools in other parts of Europe. It also promotes language learning and intercultural dialogue, and promotes awareness of the standard of multilingual and multicultural European society (III, 2010). The eTwinning Portal (www.etwinning.net ) is the meeting point and workplace action. The school partnerships in Europe is an increasingly common practice becomes widespread recognition. The eTwinning aims to link schools of Europe and of the September 2004 one of the many actions eLearning Programme of the European Commission. Through eTwinning, schools in states European Union and Norway and Iceland, will be supported in “Aderfopoiisi” schools through the Internet. The platform twinspace ensure all opportunity to contact the participants in an attractive and intuitive interface navigation, and promotes the development of knowledge with adequate number of tools used to exchange views and information on the production of new knowledge and its diffusion. Indicative, modern online chat (Chat), the electronic mail (email), the ability to save files MP3, text, presentations, videos, photographs and images, web publishing via wiki’s and blogs, calendar project, and  asynchronous discussion forums.
The immediate and short-term effects include improved collaborative and communication skills of all participants and to improve the English language. In a project implementation and its promotion based on multiple ICT skills, reasonably there are benefits for everyone in pure technical part in the management, organization and exploitation information, the interaction and the social construction of knowledge.

Another area in parallel with the central idea of ​​the project is expected to be enriched is knowledge of culture, the culture of the participants, the differences and similarities in their daily lives.

Also, it is expected that due to outdoor activities, will enhance the contact with the natural environment and respect for it. The creation of a common European consciousness and sense of common problems through empathy between the partners, is another of the required and comply with European and universal concepts the citizen of the modern world. It is up to the students / or tri creation of another class things, which will dominate the “we” in place of “ICT”

Educators

All of the above apply not only to students / or tri but also for those involved

teachers, who are hoping that they will improve their own career prospects,

will exchange teaching methods and ideas, will be involved in innovation through ICT, proceed with effective teaching methods, and gain culture participation. Expected to enhance self-efficacy and confidence all participants through the achievement of personal and team goals of the project

 ICT – ETWINNING_SHORT

ICT and eTwinning

It is undeniable that the development of new technologies and computer use, have become part of our daily routine. Lately, it has become increasingly necessary to use ICT (Information and Communication Technologies) in the educational process and how teachers and learners learn.

Through the eTwinning platform, wide use is made ​​of ICT. In eTwinning, we use ICT tools to exchange views, exchange ideas, material knowledge.

The benefits of ICT tools in eTwinning, completely change the educational process from the traditional classroom. Information, multiple format audio, video, images, animated graphics  invade the classroom. Accepted tele-ments meetings with other schools, clamped human relationships, can develop friendships between participants. Students come closer, learn the difference, respecting the specificities of both people and traditions of each place. A direct impact is to combat school violence, growing solidarity among peoples.

Students work and acquire skills in using ICT tools; skills that will be useful for the subsequent course. With appropriate ICT tools they can make presentations, websites, blogs, editing sound-pictures-video. The course is made ​​more interesting and creative. The material is created, lives and is shared with the educational community.

The teacher expands their skills in ICT, refresh their knowledge and learn new tools, like students do. Through the use of ICT, attract the interest of students, learning to think and look for information.

No one can deny the great usefulness of ICT, both for students and the teacher. It is obvious that ICT has enhanced the process of transmitting and sharing knowledge. It has also enhanced the way schools communicate and cooperate.

Elias Koulalis PE19 – 1st GEL XanthiLampaki, O. – Antoniou, P.

 How to protect Internet

 

by Elias Koulalis PE19, ICT TEACHER IN 1ST High school OF Xanthi

Distanced

Do not reveal your personal details, such as your real name, age , address , phone number , school name or your photo.

  • When you do not know the sender of an email, you just do not open it .
  • The password on the internet is there for safety reasons , so only you

and your parents will need to know . If he knows a third party may

pretend to be you and to expose .

  • There are websites that their content may be unsuitable for you , so

what to avoid .

  • Do you prefer e-mail addresses that contain the initials “https”. The “s”

means safety (security).

  • For your own safety do not participate in online gambling , because beyond

the fact that it is illegal , you may be exposed to undesirable situations .

Spam (spam mail)

The so-called spam or junk mail messages are annoying or unpleasant for the consignee content. At spam mail advertisements about undesirable products , services and websites, as well as several other types of e-mail (unsolicited newsletters). these messages are a practice prohibited Ethics of the Internet and the laws of most European Member . This is because endangering the safety of personal data Internet users and secure the safety of the networks.

The user should pay particular attention to not answer such messages , nor those with the words “remove me from the mailing list”, which instead withdraw his email address , as promised , confirm that it is active and continue to bombard the user’s inbox with more frequency.

The user can use the filters offer the most web mail to delete these messages , or to properly set up the program management mailing his computer through options given by the tabs in the menu of the program .

Also , there are programs on the Internet to combat spam mails, which can be installed locally and monitor incoming correspondence user.

Filters protection Any Internet user can and should use email filters Mail (Anti Spam). This way you can identify the unwanted mail (junk mail).

  •  Installed software protection (Anti Virus), which will control the computerand you will eliminate any viruses .
  • Save favorites to websites you visit and use oftenbecause there is a danger in seeking to make a spelling mistake and find yourself on pages with inappropriate or offensive content.

Cyber ​​Bullying

To Cyber ​​Bullying happens when someone or some people use the internet or other through digital technology to threaten , to torture , to challenge , to humiliate , annoy , or to fool others.

There are , however, in these cases self ways :

  • Never give your password to others.
  • Do not answer the same way to such messages . Once answer , and you do the same thing.
  • Do you know what is sent and what you accept as well the recipient andsender .
  • Do not send messages with personal data .
  • Never pretend you ‘re someone else / other.
  • Talk to someone you trust , like your parents or your teacher or

Increase your siblings .

  • Do not respond to any message you receive from unknown sender .
  • Change your nickname (nickname) and your password .
  • Use a special filter for emails , so you canisolated annoying .

Chat Rooms

If you have created a profile on Facebook, Myspace, your Hi5, twitter, instagram, the Msn Messenger etc , you can do a lot to protect yourself :

  • You can choose the people who will be in your contacts .
  • Avoid using your real name.
  • You can use any image or photo of your favorite assembly instead of your picture .
  • Do not upload to the internet your personal photos or videos , because it cancopied and published on other online sites, from which they will can be deleted .
  • Do not add to your friends list people who do not know , even if they sayto know you while you not.
  • You have the option to interrupt all communication when someone starts to make your very personal questions or questions of sexual content .
  • Is constantly in mind that people who know the internet can not bethey say it is.

” To meet up somewhere ? ”

Generally you should avoid to meet people you know on the internet , since there you can be sure that they are indeed what they say they are. However, if decided to meet :

  • Settle the meeting to be in public. Indeed , it would be good to choosea place where you hang out and known.
  • Undoubtedly it is better to go with a group rather than alone / h Ask a  friend or Your relatives have friendly person in relation to accompany .
  • Before you go, your parents informed about this meeting.

How to protect pages on social networking

You should never post on social networks regardless of the settings

Your security :

1) The birthday

The problem is that the birthday is one of the few data need someone to steal your password or our identity . If possible, not to mention any date.

2) The status of our relationship Whether you have a relationship or not , it is not always the best idea to publish . You to trigger a disruptive users , even shifty us bombard with messages .

Such irritation can usually be treated with block or reference user , but in case he knows enough about the things you complicated .

There are few cases where the stalker, « Hunters ” ie , have reached the end users closer to social networks and even face-to-person .

The best thing you can do is to completely ignore the relationship status , order to prevent any kind of disturbance.

3) On our site

Many users of social networking site use quite often service geotagging social network to publish their their location in status and their messages , photos and of course through of check-in.

The problem here is that the recipient of this information is not only friends us , but possibly cunning , who will not be jealous . knowing the location and possibly how long we are there and how will we get return , there is some possibility to exploit the situation . several times in the past, users who are regularly published by a holiday victim of burglary .

Instead of ” upload ” photos from our mobile and call all over the Internet how nice we go on vacation , it would be the safest to use Text messaging and publish the photos after returning home .

4 ) The fact that we are alone at home Especially for young children, who tend to ‘ advertise ‘ such events their friends (and simultaneously over the Internet ) such tactics can dangerous. The reasons are obvious and more or less the same as the two previous data .

This issue indeed one of the major reasons that parents should to proactively monitor mounts their children on the internet , but also to Elias Koulalis PE19 care to inform them of the potential risks .

Obviously, the same can be true for teenagers or even adults .

5) Photos and names of children , relatives and friends

The vast majority of parents on social networks publish photographs of children together with the name and date of birth . In many cases this done before sooner return from hospital . simultaneously publish photos of family and friends making «tag» their names without prior obtain their consent .

This may cause two kinds of problems . First, using these information , even if it’s just a name , the stackers can more easily approach you or even your kids , pretending to be some known friends or relatives. Besides, there is still the issue of using these photographs as individuals shown may not want to publish on the internet , especially if photos include their name .

We can get the permission of relatives or friends for publishing, without of course make them «tag» by name .

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s