| Computer Education for Teachers: Integrating Technology into Classroom Teaching, 4/e Vicki Sharp,
University of California - Northridge
Standards, Issuse, and Reasearch: Present and Future
Chapter OutlineISSUES AND RESEARCH I. Ethical Issues - Many different computerized systems with many different types of information increase the likelihood that users' privacy will be invaded.
- Crime
- Software Piracy
II. Viruses - A virus is a set of instructions or code that infects computer files by duplicating itself, a harmful capability in computing.
- Individuals write a virus or code and bury it in an existing program, which when loaded into a computer, attaches itself to other programs that reside in the computer's memory.
- When a person inserts an infected disk into a computer's memory, the computer's files become infected.
- Computers can be infected electronically, when a hacker creates a virus and sends it over phone lines to a local network; since the network is connected to thousands of computers, the infection is carried to all the connected computers.
- A virus program can be a silly annoyance or a destructive force, wiping out huge amounts of data.
- Viruses are hard to detect because they can be programmed to wreak havoc immediately or to lie dormant until a given future date. Viruses programmed to go off on a certain date are called "time bombs."
- Worms, often confused with viruses, are destructive programs that replicate themselves throughout disk and memory, using up the computer's resources and eventually crashing the system.
- Famous examples of both viruses and worms exist that have cost billions of dollars in computer disruptions.
- Virus protection software such as Symantec's Norton AntiVirus and McAfee Anti-Virus Scan cans for viruses, repairs damaged files, and prints status reports.
- Currently, ten to fifteen new viruses are discovered every day.
- The best protection against virus infection involves frequently backing up the hard disk; downloading into a single computer as opposed to a network system; using virus protection programs to check every piece of software for a virus before loading it into the computer's memory; not storing data on a program disk; and write protecting program disks so they cannot be destroyed.
- Some warnings about computer viruses are hoaxes.
III. Security - An urgent need exists for computer security, as computer owners must take steps to prevent theft and inappropriate use of their equipment.
- Computer theft is a growing global problem costing in the billions of dollars.
- Most computer facilities have some kind of security system, a means of confirming the identities of persons who want to use the system and rejecting unauthorized entry; authorized users are issued special cards, keys, passwords, or account numbers.
- Schools may have security that consists of a list of student names, and students can access computer rooms with keys and computers with passwords, all of which may be passed on to unauthorized users.
- Assigning access codes that are read by the computer from pass cards or smart cards with the person's picture, barcode scan, and microchip can increase security.
- Requiring every individual to enter a special code along with a pass card can increase security.
- Unscrupulous individuals have found ways to steal and distribute passwords and spread viruses.
- Desktop security programs are necessary in school computer labs where computers are subject to abuse by students.
- Computers should also be safeguarded against power surges, fires, and earthquakes through surge protectors, back-up disks, and cartridge back-up drives such as a Zip drive.
- As the number of computers in schools increases, teachers and schools must be more vigilant about computer use and security.
IV. Health Risks Using Computers - Ways to reduce the risk of injury caused by computers are increasing, in the form of wrist pads, antiglare screens, and ergonomic keyboards and trackballs.
- Repetitive strain injuries are a serious medical problem.
- Computer monitors, like other electrical devices, generate electrical and magnetic fields in a very low frequency, which raises debates about electromagnetic emissions causing health problems such as cancer.
- Most manufacturers support MPR-II (1990) or the stricter TCO guidelines for reducing electromagnetic emissions.
- Computer-related injuries can be reduced or eliminated by following these suggestions: 1. Position the body so that the lower back is supported, thighs are horizontal, and the monitor is slightly below eye level, positioned to avoid any glare. 2. Work 18 to 28 inches from the monitor. 3. Avoid unnecessarily turning up the brightness on the monitor. 4. Do not overwork and take frequent breaks. 5. Spend time finding a proper chair for the computer. 6. Place frequently used equipment in close reach. 7. Make sure keyboard keys are easy to press. 8. Do not grip the mouse too tightly. 9. Never brace the wrist against the mousepad when typing. 10. Buy an appropriate input device such as a drawing tablet, if graphics are frequently used.
V. National Standards - Leading professional groups have developed educational technology standards, which discuss what students should know and be able to accomplish with technology.
- Accreditation standards for teacher education discuss expectations for teacher competency.
- The International Society for Technology in Education has published documents that describe what prospective teachers and K-12 students should know and be able to do with technology.
- Prospective teachers seeking certification in teacher preparation should meet educational technology standards, as outlined on pp. 443-445 of the text.
VI. Instructional Research - The research literature contains many computer studies related to teaching and learning.
- CAI or computer-assisted instruction refers to applications specifically designed to teach a variety of subject areas to children and adults, in which users receive feedback from the computer and control the sequencing of the subject matter.
|
|