Reading Reflection

Chapters 9 & 10

Chapter 9

Modeling and Facilitating Use of Digital Tools

As a teacher, communication is essential to maintain open lines with students, parents and administrators.

This may include:

-Communicating curricular requirement.

-Report and discuss students progress.

-Keeping parents informed.

-Creating classroom websites/newsletters.

-Collecting student contact and health information.

When Communicating With Parents...





Expectations for Electronic Communications:

Key Terms:

Virtual Field Trips: use of audio, video or web-conferencing tools to tour or interact.

Tele-monitoring: "eMentoring," using web-based technologies to support a mentoring program.

Podcasts: digital audio files downloaded from the internet played back on the computer.

Screencasts- animated movies captured from the teacher's monitor or a whiteboard.

Open-source Software: free software that allows users to access and modifying the underlying code.

Software Evaluation Rubrics: forms that provide criteria ob which to evaluate educational softwares and websites.

Chapter 10

Legal and Ethical Use

Examples of Acceptable and Unacceptable Use:


-Abiding by polices and procedures.

-Being polite and using appropriate language.

-Enforcing appropriate use.

-Respecting copyright.

-Using online time effectively.

-Using the internet ethically and legally.


-Altering software buy deleting files.

-Assuming identity.


-Harassing an individual on internet.

-Giving out personal Information.

-Using the internet ethically and legally.

- Vandalizing equipment of digital files.


Your institution must:

1. Be a nonprofit organization.

2. Be accredited.

3. Have a copyright compliance policy.

4. Provide notice on copyright-protected materials.

5. Prevent copyright-protected material from being transmitted beyond the period of instruction.

Key Terms:

Fair Use: portion of US copyright law that allows limited use of copyrighted material without requiring permission.

Creative Commons Licensing: guidelines that limit your use to copy, edit, or build upon all or parts of their work.

Tips for Creating Passwords: Securing your information such as accounts, websites and resources.


Using information and communications technologies to harass, defame, or intentionally harm another student or group of students.

Cyberbullying can take place through:

Stop Cyberbullying!

Using Technology to Support Responsible Internet Use:

Be yourself!

Say hello.

Describe your message.

Be polite.

Make sure you mean it.

Say goodbye.

Promote Responsible Use of Technology in the Classroom!