Post on 01-Jan-2016
description
Student AccessStudent Access
Computer to Student Ratio
TF TF South South High High
SchoolSchool
Public schools
Secondary schools
Large schools
City school
50% or more
minority schools
50-74% Eligible for Free/Reduced Lunch
3.43.4 3.8 3.3 4.0 4.2 4.0 3.6
TF South is slightly below the computer to student ratio when comparing it to the national averages of
other school with similar characteristics in most categories.
(Wells & Lewis, 2006) (Robledo, 2012)
TF South does have 2 classroom TF South does have 2 classroom sets of iPads for both teacher use sets of iPads for both teacher use and classroom use. We do not and classroom use. We do not have a lending program.have a lending program.
images.search.yahoo.com
Professional Development for Professional Development for TeachersTeachers
How do we use the internet in the classroom???
images.search.yahoo.com
I chose to compare our computer to student ratio to the national averages because if we are to incorporate the internet into the classroom, we need to increase the ratio of computers to students.
I also chose to compare our hand-held computers (in our case iPads) to the national average because we have recently acquired 2 classroom sets of iPads and the statistics show that not many schools are using hand-held computers yet.
We used 3 different databases or search engines to learn how to find reliable sources.
(Google Scholar, 2012) ProQuest, 2012 ERIC, 2012
Teachers need to focus on teaching students how to look for authors who are creditable information which is unbiased and peer-
reviewed, current articles, and articles which pertain to their topic (Su, 2003).
The following are examples of the policies for TF South.
Firewalls
Teacher monitoring
Student monitoring
A) TF South uses firewalls and proxies to keep students off restricted websites.
B) Teachers monitor students access by walking around the classroom.
C) Teachers monitor students access through a software program where teachers can view student’s screens through the teacher computer. D) Students monitor their own internet access.
Currie, L., Devlin, F., Emde, J., & Graves, K. (2010). Undergraduate search strategies and evaluation criteria: searching for credible sources. New Library World, 113-124.Penn State University. (n.d.). Rethinking the Design of Presentation Slides: The Assertion-Evidence Structure. Retrieved March 21, 2012, from http://writing.engr.psu.edu/slides.htmlRobledo, R. (2012, March 6). Building Technology Coordinator. (K. Beck, Interviewer)Su, L. T. (2003). A comprehensive and systematic model of user evaluation of web search engines: II. an evaluation by undergraduates. Journal of the American Society for Information Science and Technology, 1193-1223.Wells, J., & Lewis, L. (2006). Internet access in U.S. public schools and classroom: 1994-2005. Washington: U.S. Department of Education: National Center for Education Statistics.