Tag Archives: technology integration

Top 5 TechnoKids Blog Articles of 2017

This year marks TechnoKids 25th anniversary. TechnoKids has been publishing technology projects and writing about technology education since 1993. In 2011, we published our first TechnoKids blog article, Six Benefits to Project Based Learning and Technology Integration. Since that time, we have written hundreds of blog articles. The posts connect teachers to helpful online resources, provide how-to instructions, review apps or web-based services, and express our opinion about technology integration. Thanks for reading!

TechnoKids Blog Articles – Technology Integration Ideas

Despite writing many new articles in 2017, many posts from several years ago remain reader’s favorites. In case you missed them, here are our top 5 blog posts shared and read by readers in 2017:

Wrap Text into a Shape using Photoshop CC

TechnoKids Blog  text into shape photoshop cc

Detailed instructions explain how to use Photoshop CC to wrap text into a shape. The blog post includes helpful tips with illustrations. This is a great article to bookmark if you are teaching a Photoshop unit.

Create WordArt Online

TechnoKids Blog  online wordart maker

An article that highlights one of our favorite online WordArt sites: CoolText. If you haven’t used this site before check it out! Your students will have lots of fun creating amazing titles and original text for their documents, presentations, and publications.

Color Part of a Black and White Photo using Photoshop CC

TechnoKids Blog History Brush Tool

Step by step instructions explain how to use the History Brush Tool to color part of a grayscale image. In only a few steps your students can create original artwork using Photoshop CC. Read this post if you like easy photo editing lessons.

Custom Bullets in Google Docs

TechnoKids Blog  custom bullets

In 2016, TechnoKids wrote a blog article about how to customize bullets in Google Docs. We explain how to create eye-catching lists with fun-looking bullets or professional headings that stand out with special characters. Since we published that post, Google has continued to improve the gallery of options. Your students will love the emojis!

Survey Questionnaire Ideas for Students using Google Forms

TechnoKids Blog  research question, google forms

So happy that readers love Google Forms and data analysis as much as we do! Our article about generating a meaningful research question for a survey has remained popular for years. People each day read this post. If you haven’t tried it yet, we recommend using Google Forms to collect and analyze data with your students. Designing a questionnaire and interpreting the results makes learning relevant.

Our bloggers like sharing helpful tips and resources. We appreciate that you take the time to read our blog posts. Thanks!

Quick Search Tip for Quality Results

site:search

Any search tip that makes online research more efficient is a welcome relief for teachers and students. Researching online with students can be a time consuming and sometimes frustrating task. The amount of information available on the Internet is mind boggling. Too often searches result in a lot of worthless or irrelevant information, or data of questionable trustworthiness. How can searches limit results to quality content?

Limit a search to a website

Site:search is a great way to save time and limit search results. This method restricts a search to a particular site or a specific type of site. It’s simple: in the search box, type site: followed by the limiting factor and search topic.

For example, if you want to just search the Smithsonian website for information on Wilbur and Orville Wright, type site:smithsonian.com wright brothers. Results yielded will be all references within the Smithsonian web archives, instead of the millions of suggested sites that will appear after a search for ‘wright brothers’. Left out are blog or opinion articles, all commercial sites using the name Wright Brothers, or any other unrelated sites. As an added bonus, since the source of all information will be the Smithsonian Museum, you know that the facts will be authentic and trustworthy.

Limit a search to a domain type

Learn Research SkillsInstead of limiting a search to just one site, you can restrict it to a type of site. This eliminates a whole minefield of biased or unreliable sources. For example, if you are searching for information about forestry and you type gc.ca Canada lumber, you will receive only sites that are published on Canadian government websites. Such information is authoritative and saves time researching the credibility of sources.

Here are some ways to restrict searches to trusted websites appropriate for classroom use.

Limit a Search to a Domain Type:
site:gov site:org site:edu
Limit a Search to Government Sites:
site:epa.gov site:nasa.gov site:loc.gov
Limit a Search to Organizations:
site:britishmuseum.org site:pbs.org site:worldwildlife.org
Limit a Search to Publications:
site:nationalgeographic.com site:timeforkids.com site:popsci.com
Limit a Search to Research-Based TV Shows:
site:history.com site:biography.com site:discovery.com

site:searchTeach your students the site:search tip. Their online research will be more efficient and will yield better, more legitimate results. TechnoResearch is a technology project that introduces essential research skills to elementary and middle school students. Learn how to plan, retrieve, process, share, and evaluate information. Using this fun and engaging project, students will acquire skills that are transferable to any inquiry challenge in all areas of the curriculum. Read more about TechnoResearch here.

Why Students Should Use Presenter View in PowerPoint 2

In my previous post, I explained how to use Presenter View in PowerPoint 2016. It’s a nifty feature that, if you have a projection system, allows a presenter to see the current slide, next slide, speaker notes, and presenter tools on a separate screen. The audience sees only the slide.

Benefits to Presenter View

Speaker Notes

Teaching students how to give a presentation that is informative while captivating the attention of the audience is a valuable skill. An essential part of a presentation is the preparation of speaker notes. These notes provide structure to a presentation and encourage the audience to listen as well as view the screen. Speaker notes can include reminders of what to say and additional information or facts that do not appear on the screen. If a second screen is not available, speaker notes can be printed as Notes Pages or as an Outline. But if you have a projection device and can see the computer screen while presenting, Presentation View allows you to see your notes and reminders on your computer screen during the presentation. The projector only shows the slide to the audience.

Practice Practice Practicepresenter view
Any presentation should include a number of rehearsals, either privately or with peer coaching, before it’s ready to unveil to an audience. Using Presenter View, the speaker can rehearse with the navigation tools, see the current and upcoming slides, practice using his notes, and become proficient using the pointer tools.

Control the Flow of Information
If the text on a slide is contained in bulleted points, set the animation so each one appears upon a mouse click. That way, you can limit the amount of words the audience can read and expand on the information as you speak. The audience will focus on both the slide as well as the speaker.
If there are pictures, you may want to control when they appear. Set the animation so images or diagrams show upon a mouse click. The viewers will focus on the picture only when you cause it to appear.
Presenter View allows you to preview what will happen when you press ‘next’ in advance of the audience seeing it.

Tools
The laser pointer, pen, highlighter, and eraser allow you to annotate, draw, or direct the eyes of the audience to particular words or images on the slide. Used sparingly, these tools help to attract and hold the attention of the audience. You can even black or white out the screen should you want to stop or pause the slide show.

presenter view

Use the laser pointer, pen, or highlighter to direct the viewers’ attention.

See All Slides
During the question period at the end of the presentation, or at any time during the presentation, you may want to go to a particular slide. If you click See All Slides, a thumbnail of all slides appears on the presenter’s screen only. Click on the desired slide and it will appear on the audience’s projected screen.

Timer
The stopwatch at the top corner of Presenter View is handy if there is a time limit for the presentation. It’s also useful when practicing – are you speeding up each time you present? Be careful not to talk too fast when you become familiar with the slide show. Remember that the audience is watching it for the first time.

Teach Presentation Skills

technopresenterTeach essential research skills, power up a presentation, and build public speaking techniques with TechnoPresenter. Integrate this technology project into a curriculum area using any topic of study. This project is suitable for student in junior and middle school grades. Learn more about TechnoPresenter here.

Cyberbullying – Teach Awareness and Responses

As educators, we strive to promote a climate of respect. Bullying behavior is evident on the playground, but it is more difficult to detect and respond to when it takes place online. In addition, students need to recognize cyberbullying. They need to know when the line is crossed and a joke or teasing has gone too far. The first step is to build an awareness of cyberbullying. Next, students should know what they can do and who they can go to for help if they are a victim. Promote a community of responsible digital citizens in the classroom.

What Is a Cyberbully?

cyberbullyingCyberbullies are people who threaten another person by using the Internet to post hurtful or embarrassing messages, images, or videos. Cyberbullies can make a person feel scared, worried, or angry.

Often a bully will say that the message “was just a joke.” Cyberbullying is NO JOKING MATTER and it is NOT FUNNY.

Cyberbullying is illegal. In some countries cyberbullying is a hate crime that can result in a fine or jail time. In other countries, cyberbullying is slander and a lawsuit can be filed against the bully. At some schools, cyberbullying is a reason for expulsion or cause to ban use of Internet at school.

Do Not Be a Cyberbully

Be a responsible digital citizen. Do not be a bully!

  • Do not continue to e-mail someone after they have asked you to stop.
  • Do not post any comments online, using e-mail, chat, or social media sites, which would be hurtful or embarrassing to another person.
  • Do not threaten anyone using e-mail, chat, or social media sites.
  • Do not post or tag a picture of anyone without their consent.
  • Do not share personal information about another person without their consent.

What Should You Do if You are a Victim of Cyberbullying?

When you are bullied it can make you feel worried or scared. Do not ignore the problem. You can stop cyberbullying. To do this:

  • Tell an adult about the bullying.
  • Do not delete the message from the bully. It is evidence.
  • Inform your Internet service provider. They can help find the identity of the bully.
  • If a message contains a death threat or threat to cause bodily harm, contact the police.

What Can You Do to Stop Cyberbullying?

Cyberbullying can be done using e-mail, instant messaging, bulletin boards, websites, polling booths, and more.

  • E-Mail: Cyberbullies send hateful messages to a person using e-mail. Often the cyberbully will register for a free e-mail account so no one will be able to guess their identity. They may register for an e-mail address that has a threatening tone such as kickname@live.ca.

    What can you do if you are a victim? Add the e-mail address of the sender to a blocked e-mail list. This will stop new messages from being delivered. It is possible to trace the source of an e-mail. You can contact the Internet service provider of the e-mail account to try to get the company to delete the e-mail address of the cyberbully.

  • Instant Messaging: Cyberbullies send hateful messages to a person using chat software. Often the cyberbully will change their nickname to include a nasty message such as “Name is ugly” or ” I hate name.” Everyone who receives an instant message from the cyberbully will be able to read the mean nickname.

    What can you do if you are a victim? Add the contact information of the sender to a blocked list. This will stop new messages from being delivered. If the cyberbully is a student, you can contact their parent or teacher to let them know about the abuse.

  • Bulletin Boards: Cyberbullies post hateful messages to a bulletin board that people can read. The messages often include the victim’s telephone number or e-mail address to get other people to abuse the person.

    What can you do if you are a victim? Contact the manager of the bulletin board. The manager can delete the hateful message and stop the cyberbully from posting any new messages.

  • Websites: Cyberbullies create web pages that have mean pictures or hateful information about another person.

    What can you do if you are a victim? Most Internet service providers have rules about the content of websites. When cyberbullies create hateful web pages they are breaking the rules. The Internet service provider can request that the bully remove the content on the web page or delete the website.

  • Polling Booths: Cyberbullies post online surveys where people vote for the ugliest, fattest, dumbest boy or girl.

    What can you do if you are a victim? Polling booths are often part of a service offered by an online social community. Most communities have rules about the content members can post. When cyberbullies create hateful polls they are breaking the rules. The operator of the social community can request that the bully remove the poll or delete their member account.

  • Imposter: Cyberbullies will hack into the victim’s account. As an imposter, they will send fake e-mails or post rude comments.

    What can you do if you are a victim? Protect your identity. To do this, create a password that is difficult to guess. Do not tell your password to anyone, except your parent or teacher. Always log out when you leave a computer. If someone hacks into your account, change your password right away.

For more Internet activities and digital citizenship lessons, see TechnoKids’ technology project TechnoInternet.