Technology in the Classroom Lesson

**FYI, the first two classes were lessons 1 and 2 (five hour class)**

Today we learned that being a student is a necessary process in learning. We as students learn what we need to first then what we want too. I am learning along with you, Thank you

Home work

1)Prepare a 10 minute speach

2)Speach should try to make one person laugh.

3) Leave a comment about tonight’s lesson. (What you feel went wrong or right, do you feel we could have covered a different topic? anything else you want to discuss)

Primary Objectives

Video to help

Secondary Objectives

Technology is not going anywhere embrace the possibilities

We won’t always be driving instructors and technology helps broaden the horizon

Information on the internet can replace expensive programs

Dorthy Nixon Tutorials

^^^^ This link will help you with many Microsoft office programs. They are designed to help students build a project, and learn as you build. Students would then apply the knowledge learned to other areas of their personal or professional lives.

Here is some additional information about the potential of Google (and all it’s glory)

We also touched on the idea of internet security.

This article is from a site called


As is the case with physical attacks or break-ins, malicious hackers and those attempting identity theft will go after ‘low hanging fruit’, people who essentially ‘leave the door unlocked’ when it comes to their digital assets.

As most of us know, digital identity theft, tracking software, and various forms of hacking are becoming more and more of a threat to the average person. While protecting yourself completely is a daunting and seemingly impossible task, there are simple steps you can take to significantly improve your chances of avoiding a situation involving identity theft:

1. Password protect – The most common password is 123456. Instead, choose non-dictionary word, or a long string of 30 or more characters that are combinations of dictionary words. This is the simplest step you can take to protect yourself from identity theft (and surprisingly it’s often the most effective).

2. Disconnect – When you are not using your WiFi, turn it off, and when you are finished using an application or online service like email, log out every time. Having WiFi on all of the time leaves your network open to penetration and makes identity theft more likely.

3. Download with care – Research apps before downloading them. It is too easy to run into malware while downloading what you think is a harmless app. We’d like to think that if it is in the app store, it must be safe, but unfortunately that isn’t the case. Most apps have not been reviewed for safety.

4. Update regularly – Having access to the latest security updates for your device is an important step in keeping your data safe.

5. Review your security settings – It’s a very good idea never to trust any pre-set security settings on your apps, or your devices. Most of them default to having location tracking turned on, and cookies and other data – collecting options enabled. Most of the time it’s in the company’s best interest – not yours – to receive this information about you. And yes…having minimal security enabled certainly puts you in the ‘low hanging fruit’ category and vulnerable to identity theft.

6. Shield While you are sleeping or your devices are not in use, shield them from any incoming or outgoing transmissions. While your device is safely sealed inside of a shielding case, the data cannot be penetrated. This works with your smartphone and your credit cards. This is the most secure and impenetrable form of protection against digital identity theft.

Here is another article about Web security from

Identity theft is any kind of deception, scam, or crime that results in the loss of personal data, including the loss of user names, passwords, banking information, credit card numbers, Social Security Numbers and health ID’s, that is then used without your permission to commit fraud and other crimes.

Up to 9 million Americans have their identities stolen each year according to the FTC1 , and at least 534 million personal records have been compromised since 2005 through attacks on the data bases of businesses, government bodies, institutions, and organizations.. If those breaches were spread evenly across the U.S. population of 310 million, everyone would have had their identities stolen one and two-thirds times.

For some consumers, identity theft is an annoying inconvenience and they can quickly resolve their problems and restore their identity. For others recovering their identity can cost hundreds, even thousands of dollars, take months to resolve, cause tremendous damage to their reputation, cause them to lose job opportunities, even influence the rejection of loan applications for school, homes or cars because would-be employers or loan companies see the damage on your credit scores. Some consumers have even been arrested for crimes committed by someone using their identities and have had to prove that they were not guilty.

How are identities stolen?

Consumers become victims of identity theft through many types of exploits. These can happen the old fashioned ways when crooks (including family members!) steal mail from your mailbox, rummage through your trash for bills and bank statements, steal wallets and purses, or make an extra copy of your credit card – perhaps when your waiter or clerk walks off to process your payment.

Online identity theft occurs when users fall for tactics like phishing and confidence scams; or download malware onto their computers or smartphones that steals their information; use wireless networks that are insecure; take out money from an ATM that has been rigged with a skimming device that collections your information; share their passwords with untrustworthy people, or by having their information stolen when data records are breached on companies, government, and educational sites.

7 key steps to preventing identity theft online:

  1. Protect your computer and smartphone with strong, up-to-date security software. If your computer or phone is infected with malicious software, other safeguards are of little help because you’ve given the criminals the key to all your online actions. Also be sure that any operating system updates are installed.
  2. Learn to spot spam and scams. Though some phishing scams are easy to identify, other phishing attempts in email, IM, on social networking sites, or websites can look very legitimate. The only way to never fall for phishing scam is to never click on a link that has been sent to you. For example, if the email says it’s from your bank and has all the right logos and knows your name, it may be from your bank – or it may not be. Instead of using the link provided, find the website yourself using a search engine. This way you will know you landed on the legitimate site and not some mocked up fake site.
  3. Use strong passwords. Weak passwords are an identity thief’s dream – especially if you use the same password everywhere. Once the thief knows your password, they can log you’re your financial accounts and wreak havoc. You need passwords that are long (over 10 characters), strong (use upper and lower case letters, numbers and symbols), and that have nothing to do with your personal information (like name, age, birthdate, pet)
  4. Monitor your credit scores. By law you have the right to three free credit reports per year; from Experian, Transunion, and Equifax.These three credit bureaus work together through a website called so you can quest all three reports at once in one of the following ways:
    1. Go to the Web site. Through this highly secure site, you can instantly see and print your credit report.
    2. Call toll-free: (877) 322-8228. You’ll go through a simple verification process over the phone after which they’ll mail the reports to you.
    3. Request by mail. If you live in certain states, fill out the request form and mail it to the Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281. (Get more details.)

    Note: Remember that after you request a report, you will have to wait a year to get it free of charge again from the same credit reporting company. (Of course you can pay for a copy of your credit report at any time.)

  5. Review your credit score. Look too see if there are new credit cards, loans or other transactions on your account that you are not aware of. If there are, take immediate steps to have these terminated and investigated.
  6. Freeze your credit.Criminals use stolen ID’s to open new lines of credit. You can thwart their efforts to use your identity by simply locking (called freezing) your credit so that no new credit can be given without additional information and controls. Many states have laws giving you the right to a free credit freeze, but even where states don’t provide legal mandates, the large credit bureaus provide a voluntary security freeze program at a very low cost.
    To determine whether there are any costs associated with placing a security freeze on your credit, and for temporarily lifting that credit freeze when you do seek credit, see State Freeze Requirements and Fees.
  7. Only use reputable websites when making purchases. If you don’t know the reputation of a company that you want to purchase from, do your homework. How are they reviewed by other users? Do they have a strong rating with the Better Business Bureau? Do they use a secure, encrypted connection for personal and financial information? (You should see an Https in a website’s URL whenever they ask for personal or financial information).
  8. Stay alert.Watch for common signs of identity theft like:
    • False information on your credit reports, including your Social Security number, address(es), name or employer’s name.
    • Missing bills or other mail. If your bills don’t arrive, or come late, contact your creditors. A missing bill may indicate that an ID thief has hijacked your account and changed your billing address to help hide the crime.
    • Getting new credit cards sent to you that you didn’t apply for.
    • Having a credit approval denied or being subjected to high interest rates for no apparent reason.
    • Receiving calls or notices about past due bills for products or services you didn’t buy.

Consistently applying these eight steps to both defend and monitor your credit score will reduce the risks of having your identity stolen, and alert you instantly if such a problem arises.

25 thoughts on “Technology in the Classroom Lesson”

  1. By bringing the latest Internet, media, and educational technologies into the classroom, creative Instructors can enable students to learn new material within mediums they’re already proficient and comfortable with. Instructional theory then becomes relatable and early learners are much more likely to have greater long term retention………

  2. Infusing technology into a presentation can enhance the classroom dynamic with visual and auditory dynamics common to a young students usage of technology in everyday life. The combination of a technology driven presentation coupled with traditional oratory instruction may allow the instructor to connect with and engage the student in ways not made possible solely by means of traditional oration. The tools provided in the technology lesson are useful in creating various computer based documents, information outlets, business solutions, and simple website creation.

  3. I use DVD’s and even current events newspaper articles in my presentations; but its nice to know that the tools you taught us last night are available to us.
    Specifically I thought what you presented was useful but too many technical concepts to cram into one session, at least for this old man. You might be better served in the future to reduce the number of topics from 3 or 4 to 1 or 2 and hope that more students are able to benefit from quality versus quantity.
    Additionally the heat in the lab was disconcerting for me. Perhaps in the future special arrangements could be made with the maintenance folks to have better ventilation for the class especially when its held in warmer weather
    Not all of us have the same level of technical skills and those who have a more advanced skill set should be more tolerant of those who do not. I was amazed and even startled at some of the conflicts I was able to hear both near me and across the room. I always try to remember a statement of a wise friend who is a year older than I am…..” with actions there are consequences”!! We should always treat others as we would want to be treated ourselves.
    Kye, you clearly spent some quality time arranging for last night’s class and you went to great effort to expose us to techniques and tools that many of those attending will be able to use for presentations throughout their careers….we should all be very grateful to you for that. On behalf of myself I truly thank you and appreciate you.


  5. I think it was a great class. I for one am very familiar with technology, but even I learned something from the class. I think technology is a great addition to any class. It really makes the class feel up to date as well. A lot of videos are old and is can sometimes make the class feel old. This is the computer and smartphone age and many of the students we will be teaching are much more comfortable with using their smartphones rather than using a pen and paper. As long as you don’t go overboard with technology use and use it properly, it’s a good addition to any class presentation. When I took defensive driving a year ago there was absolutely no technology in it. The guy even used a vhs tape. It really made the class feel more drawn out and old. I felt like it wasn’t a class for this day and age. Just my opinion. Technology keeps the class feeling fresh and running efficiently.

  6. It was really amazing to know how we can create our own website. Thank you for teaching us that. Also, it would be great if we discuss about how we can easily present us infront of people/audience without any stress or tension!

  7. I really enjoyed the class. I already know a lot about technology, however I still learned some new things. I think incorporating technology in the class gives it a modern feel. I took the 6 hour course not too long ago and the man was still using vhs and it made it feel very old and outdated. As long as the technology is used right and not overused it is a good thing. We are in the modern age now and the class should reflect that as well as the videos if possible.

  8. Learning to use modern technology for classroom instruction can enhance students ability to effectively gain knowledge with tools they are accustomed to.

  9. Insightful, how much is google paying you ?- Great stuff for all around creations of techniques and presentations …

  10. I thought today’s class was very helpful. I enjoyed that you showed us how to use Google Drive and how you could actually create slides online in the browser. That was something new that I learned. I think that being able to use technology would be very convenient in teaching the 5 hour class.

  11. The class involving technology was very helpful. The class demonstrated the essentials of how technology can be a plus in teaching the five hour class for instructors, to keep them on track with their presentations. It provides a foundation for various techniques to be demonstrated.

    Lisa Chung

  12. Thank you Kye for another interesting class. Much like the first class this week, I’m amazed by how much Google can do , how useful it is and just how crucial it is to help build a better understanding in teaching. By using technology such as this, your teaching world is endless.

  13. Good class using the computer lab and embedding videos and preparing a strategies for teaching the 5 hour class.

  14. Good class, for me it will take some time and patience but I will get there. I will take advantage of the resoures that Kye provided on his website. Thank You for getting me started

  15. Great Class For Me.I Am Not Fond With Technology More Old School With Paper And Pen And Chalk Board.This Is The Era Of Technology And The Steps How To Do The Power Point And Insert Videos In Teaching The 5 Hr Class.Technology Will Be A Big Plus In Teaching The 5 Hr Class And In One’s Daily Life..Great Job..

  16. Glad to see that google is a great flexible tool to use in our classroom. Use of technology adds a sense of realism and credibility and allows us to be more cutting edge. It also allows for a system to be built and to be used consistently in the delivery of training. Thanks Kye.

  17. I am so happy with everything that I learned from Tuesday’s class. This lesson expanded my knowledge on technology. I’ll be sure to apply this in my 5hr class as well as other areas.

  18. I can see every class stretching me in all sorts of new ways. I am looking forward to the next class, Thanks,

  19. Im really an old school guy and all this technology is a little mind blowing. But I’m not afraid learn and i am getting better.Thanks Kye for all the valuable info. and thank you for the great lessons. I’v learned so much under your instruction,your a wonderful person and a fantastic Teacher, I’m glad to have had the opportunity know you Professor Kye Weaver. Never I will forget the lessons or the positive impact you had on me in the classroom.

  20. Even though, we did not get an opportunity to discuss this topic I appreciate all the information given. It will be put to good use, thanks Kye!!!!

  21. Although due to time we skipped over this lesson, but information in here is very useful, thanks for these tools !

  22. Throughout all the lessons we were immensed in technology with the use of the class computer to show our videos in class for our presentations and it was a great way to use as another way in helping us to present our topics in class that can be use for presenting our own 5 hour prelicensing class, thanks Kye for this, peace…..

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s