Question
click below
click below
Question
Normal Size Small Size show me how
edtechevyfinal
final test
Question | Answer |
---|---|
As shown in the accompanying figure, ____ is a digital media application that accepts input from the user and performs some action in response. | interactive digital media |
____ is a fundamental element used in all multimedia and digital media applications like those in the accompanying figure. | Text |
In a digital media application like the kind shown in the accompanying figure, the following clickable object can function as a link: ____. | text, video, graphics, and all of the above |
____ are a digital representation of nontext information such as a drawing or photograph | Graphics |
Individuals who are ____ learn concepts faster or retain a higher percentage of material if they see the information presented graphically | visual learners |
The term ____ refers to visual frames played back at speeds of 15 to 60 frames per second | video |
Research has shown that when a student has a chance to hear, see, and interact with a learning environment, he or she can retain as much as ____ percent of the information | 80 |
Documents that describe curriculum standards and benchmarks for learning like those in the accompanying figure are called ____ | curriculum guides |
As shown in the accompanying figure, a curriculum ____ defines what a student is expected to know at certain stages of education | standard |
As shown in the accompanying figure, a benchmark is a(n) ____ | measurable learning outcome tied to a curriculum standard |
____ is the combination of all technology parts, such as hardware and software, together with each subject-related area of curriculum to enhance learning | Technology integration |
____ is having the technology in the classroom at the teachers' and students' fingertips | Point of instruction |
When teachers have an open window of opportunity for the information to be comprehended in greater detail by students, this is called a ____ | teachable moment |
A(n) ____ refers to how individuals learn, including how they prefer to receive information, express themselves, and process information | learning style |
A(n) ____ motivates students to want to learn, guides the student learning process, and promotes a learning atmosphere and an appreciation for the subject | facilitator of learning |
____ experiences are instructional experiences that demonstrate real-life connections by providing an association between the concepts taught and a real-life activity or event | Active learning |
Teachers should promote ____ learning, in which students become engaged in inquiring, investigating, reflecting, solving problems, and formulating and answering questions | participatory |
For students to understand new concepts, they must have background information or a knowledge base on which to build; this is called ____ instruction | anchored |
Anchored instruction also includes the component of ____, in which students use background (an-chor) information to begin to solve and understand complex problems or concepts | problem-based instruction |
Discovery learning is a(n) ____ | inquiry-based method for teaching and learning |
Applications like those in the accompanying figure allow students to build a(n) ____, which is a mental bridge to build an understanding of complicated concepts | cognitive scaffold |
The application shown in the accompanying figure is an example of an interactive ____ encyclopedia | multimedia |
As illustrated in the accompanying figure, the Internet and the World Wide Web have been called the ____ | educational equalizer |
The concept illustrated in the accompanying figure refers to giving students of all backgrounds, soci-oeconomic levels, learning styles, and learning abilities access to the same ____ | information |
____ learning refers to a method of instruction where students work collaboratively in groups to achieve learning objectives and goals | Cooperative |
The best strategy for curriculum ____ is to put the technology into the hands of trained teachers, make it easily accessible, and let them decide how best to use it in their classrooms at the point of instruction | integration |
Teachers then can use an array of ____ to develop a learning environment in which students are encouraged to be independent learners and take responsibility for their own learning | teaching strategies |
A(n) ____ is an outline that specifies the school district’s procedures for purchasing equipment and software and training teachers to use and then integrate technology into their classroom curriculum | technology plan |
A mentorship program teams new teachers with experienced teachers to encourage new teachers to learn to ____ | integrate technology resources |
One important consideration is deciding on the most appropriate technology to achieve desired ____ | learner outcomes |
The most important advantage of using a computer lab is that all students are provided with ____ using computer technology | hands-on experience |
By bringing technology to the classroom at the point of instruction, a ____ can effectively integrate technology into the classroom | wireless mobile lab |
A ____ is designed to identify individual students' academic and technology skill levels and then create a starting point for developing instructional strategies | skill assessment survey |
A ____ is an instructional planning chart to assist a teacher in identifying curriculum objectives | KWL chart |
A KWHL chart adds the ____ component to the instructional planning tool | How |
A(n) ____ is a systematic guide for planning an instruction or a lesson | instructional model |
The ____ Model is a procedural guide for planning and delivering instruction that integrates technologies and media into the teaching process | ASSURE |
Digital media authoring software allows individuals to ____ | create interactive digital media appli-cations |
____ is included on new Apple computers and is designed for the digital media revolution | iLife |
A(n) ____ turns a computer and data projector into a powerful tool for teaching and learning | interactive whiteboard |
Curriculum frameworks usually include ____ | subject-specific goals, benchmarks, forms of evaluation |
For authentic learning to take place, teachers must involve students in the process of ____ infor-mation to make informed decisions | gathering using analyzing |
Technology helps teachers promote participatory learning and create authentic learning experiences by allowing students to ____ | conduct Web-based research create a wiki with results from a group science project create a slide show for a history presentation explore concepts in a digital media presentation |
Higher-order thinking skills include ____ | critical thinking the ability to interpret and solve complex issues problem solving |
A teacher’s manual is a booklet that contains ____ | information rules and regulations rights and responsibilities policies and procedures |
Interactive digital media, like those in the accompanying figure, allows users to move through infor-mation at their own pace | T |
Digital media applications, like those in the accompanying figure tend to distract and discourage stu-dents | F |
A graphic, also called a picture or image, can contain movement or animation | F |
Curriculum standards like those shown in the accompanying figure do not vary from state to state and usually cover core subjects, such as language arts, mathematics, science, social studies, art, health, and foreign languages | F |
The curriculum should drive the technology; that is, teachers should use the appropriate technologies to enhance learning at the appropriate times | T |
Popular uses for networked school computer labs are for students to work through tutorial software and integrated learning systems software | T |
Point of instruction is having the technology in a technology lab | F |
Motivating students to learn is one area that all educators constantly are trying to achieve | T |
Using technology tools with students with varying abilities cannot assist in addressing the different learning styles | F |
After you have determined specific standards and related learning objectives and identified technologies appropriate for areas of the curriculum, you then can begin to develop innovative ways to teach | T |
The use of technologies such as digital media and the Web is highly unlikely to help address learning styles typically neglected by traditional teaching methods | F |
A facilitator of learning motivates students to want to learn, guides the student learning process, and promotes a learning atmosphere and an appreciation for the subject | T |
Welliver's Instructional Transformation Model describes six hierarchical stages of science integration through which all teachers must progress to use technology effectively | F |
Teachers and administrators can overcome integration barriers with effective leadership, proper training, planning, and a commitment to enhancing teaching and learning using technology | T |
Research shows that using technology in the classroom motivates students, encourages them to become problem solvers, and creates new avenues to explore information | T |
A cognitive scaffold is a mental bridge to build an understanding of complicated concepts, built in part using applications like the one in the accompanying figure | T |
The Internet and the World Wide Web as shown in the accompanying figure have been called the educational equalizer | T |
The best strategy for technology integration is to put the technology into the hands of untrained teachers, make it inaccessible, and let them decide how best to use it in their classrooms at the point of instruction | F |
Teachers need not plan for the use and integration of computers and technologies in the classroom; today’s technologies invite the effective spontaneous use thereof | F |
An alternative version of the KWL chart, a KWHL chart is an instructional planning tool that adds the How students will learn component to selecting curriculum objectives | T |
When you have unclear student objectives, you can select your materials and determine the focus and purpose of the lesson or project | F |
Students need not be asked to reflect on their learning experiences, their perceptions on the content learned, or their evaluation of the learning process | F |
With a computer image projected onto a SMART Board, you can interact with a touch-sensitive sur-face to access and control any digital media application | T |
The ActivBoard is activated not by an electronic pen, but by touch | F |
Many states contract with schools to purchase specific software applications at reduced prices and these are included on a district bid list | F |
Audio refers to a graphic that has the illusion of motion | F Animation |
Virtual journeys allow you to walk through doorways, down halls, and let you see everything in a three-dimensional world via a computer as if you were there _________________________ | F, field trips |
A learning model refers to how individuals learn, including how they prefer to receive information, express themselves, and process information _________________________ | F, style |
Providing a knowledge base on which students can build is called active instruction _________________________ | F, anchored |
Delineated learning is particularly appropriate when teaching to a wide variety of learning styles _________________________ | ANS: F Participatory , Secondary |
____________________ refers to any computer-based presentation or application software that uses multimedia elements | Digital media software |
Documents called ____________________ are provided to school districts by state education de-partments for the description of curriculum standards and benchmarks for learning | curriculum frameworks, curriculum guides, curriculum maps |
____________________ identify skills that must be mastered by a current grade level | Mastery Objective Checklists |
As shown in the accompanying figure, a(n) ____________________ is a specific, measurable learning objective or indicator that usually is tied to a curriculum standard | benchmark, learning objective, learning expectation |
Bringing different parts together to combine into a whole is ____________________ | integration |
A designated classroom filled with computers and technology for groups of students to use is a(n) ____________________ | technology lab, computer lab |
Research shows that computers and related technologies are more effective when integrated into subject content and placed at the ____________________ in the classroom | point of instruction |
A(n) ____________________ is an open window of opportunity for the information to be comprehended in greater detail by students | teachable moment |
Providing a knowledge base on which students can build is called ____________________ | an-chored instruction |
A(n) ____________________ is a mental bridge to build an understanding of complicated concepts, built in part using applications like the one in the accompanying figure | cognitive scaffold |
A(n) ____________________ teams new or novice teachers with experienced teachers to encourage new teachers to learn to integrate technology resources | mentorship program |
A(n) ____________________ is a very helpful planning chart in determining skill and knowledge levels of students prior to beginning almost any project | KWL chart |
A(n) ____________________ is a systematic guide for planning instruction or a lesson | instructional model ____________________ is thinking back on the components of the teaching and learning process and determining the effectiveness of the learner outcomes and the use of technology |
The ____________________ is one popular educational model that teachers can use to plan for technology integration into instruction | ASSURE Model |
Creating or developing ____________________ involves producing various digital media elements, defining the elements’ relationships to each other, and then sequencing them in an appropriate order | digital media presentations |
Microsoft ____________________ allows teachers and students to create digital media presenta-tions that can incorporate text, graphics, animation, audio, video, links, and most importantly, inter-activity | PowerPoint |
The ____________________ turns any surface into an interactive surface, such as a table, wall, or traditional dry-erase whiteboard | Brightlink Interactive Projector |
The ____________________ is a multi-touch, multi-user interactive learning center designed to encourage collaboration, discussion, and consensus building | SMART Table |
Many educators teach their students to use a(n) ____________________, which is looking for the most important or fundamental part of a topic | essential questioning technique |
You would like your students to work in small groups on various activities. Which of the following would be the best learning environment to use | learning centers |
You would like your students to each work on their own word processing document. Which of the following would be the best learning environment to use | computer lab |
Which of the following kinds of activities would you pursue if you wanted to demonstrate real-life connections | authentic learning |
Which of the following activities provide students background information to begin to solve and understand complex problems or concepts | anchored instruction |
____ is defined as the delivery of instruction from one location to another, which means the teaching takes place in one location in the learning takes place at another location | Distance learning, Distance education, Distributed learning |
A(n) ____ course is delivered via the Web, rather than in a traditional classroom or via the mail | online, Web-based , eLearning |
A(n) ____ is a presentation, lecture, workshop, or meeting that is transmitted over the Web | Webinar, Web-based seminar, online workshop |
____ utilizes a local network or the Internet for delivery of content and interaction between students and teachers, as well as content | Virtual learning, Online learning, Electronic learning, Distributed learning |
Many schools and universities use terms like ____ to define classes that are combination of both F2F and online | Blended, Mixed, hybrid |
____ communication is a direct form of communication, in which communication happens in real time where parties involved are present at the same time | Synchronous |
____ communication includes a phone call or a face-to-face conversation | Synchronous |
____ communications occur at different times, and do not require that parties be present at the same time | Analog |
An example of ____ activities includes text messaging | asynchronous |
____ is one approach to distance education that uses the technologies of the Internet and the World Wide Web | WBT |
_____refers to a type of service that allows meeting events to be shared with individuals in different locations | conferencing |
Web-based courses offer many advantages for students who ____ | live far from a college campus, have scheduling conflicts, work full-time, all of the above |
Web-enhance | |
The ____ shown in the accompanying figure is also called a CMS | LMS |
a. c. TMS b. BPS d. MMS All of the following are commercial software packages of the technology shown in the accompanying figure EXCEPT ____ | Drupal |
A learning ____ is a teacher or instructor who creates individualized lessons and engages with the learner through effective personal communication, feedback, and assessment | coach |
Blackboard ____ allows teachers and students to engage in the learning process using Web confer-encing and other technologies as if they were F2F | Collaborate |
____ learning, like the kind illustrated in the accompanying figure, may include the use of videos, virtual field trips, Webcast and Webinars, curriculum-specific apps, mobile devices, collaborative software packages, social media, broadcasting, multimedi | Hybrid |
The kind of learning referred to in the accompanying figure is sometimes also called ____ learning | hybrid |
Researchers and education leaders predict that by the year 2013, ____ percent of K-12 schools will be offering blended education, including some elementary schools | 40 |
All of the following are practical reasons that blended learning is gaining acceptance EXCEPT ____ | diminished student learning in traditional classrooms |
One benefit of ____ learning is that it gives teachers the ability to assess students promptly, and then provide quick feedback and individualized instruction based on the assessment | blended |
____ instruction provides students with different opportunities and ways to master content | Differentiated |
Many virtual schools use Blackboard ____or another program to support students during the use of live sessions | Collaborate |
An online whiteboard is similar to ____ used in face-to-face classrooms except that these are 100 percent online and do not have as many features | IWBs |
Time ____ is the process you develop and tools you use to organize your day to be more efficient and productive | management |
All of the following are calendar programs EXCEPT ____ | Timekeeper |
____ are a set of guidelines or ground rules that define the teacher and student expectations in an online course experience and help things run smoothly | Protocols |
____ teaching is a method of instruction in which two or more teachers work together to combine their individual talents into one classroom course | Team |
One way to be prepared for Murphy's Law is to backup your files weekly on a flash drive, portable hard drive, or use ____ storage | Cloud |
____ is a type of learning that incorporates the use of cost efficient, lightweight, portable devices such as smart phones or tablet computers | mLearning |
____ has been very effective in extending the demand for distance education | mLearning |
Today, there are over ____ apps that were created specifically for educational purposes | 50,000 |
A rapidly emerging trend for supplementing online teaching and learning is a concept called ____ learning | app-enhanced |
Popular Web ____ tools and editors use by educators include Google Sites and TeacherWeb | development |
____ is a user-driven way of presenting content to others online | Google Sites |
A(n) ____ is an informal Web site consisting of time-stamped articles, or posts, in a diary or journal format | blog |
Blogs can be ____ | private, subject specific , entertaining, All of the above |
A wiki ____ facilitates the operation of wiki sites | engine |
A(n) ____ is an easy way to create a Web site where students can showcase their work and projects | wiki |
Examples of podcasts include all of the following EXCEPT ____ | translations of blog feeds |
To create a podcast, you need a computer with a microphone to capture the audio input, software that allows you to export the audio file in the ____ file format, software that lets you create an ap-propriate feed, and a site to upload your podcast to | MP3 |
A ____ is a digital recording of a computer screen output, often containing audio | screencast |
____ is a powerful, yet easy to use solution for you and your students to record, edit, and share high-quality instructional videos, student-created video-based projects, and more on the Web, via CDs, via DVDs, and via mobile devices | Camtasia Studio |
____ assessment uses non-traditional methods to determine whether students have mastered the appropriate content and skill level | Alternative |
Most Web conferencing events do not require additional software to be downloaded and installed on your computer before you can participate in the event | F |
A number of fully accredited universities no longer provide traditional courses | T |
One benefit of using the Web in the classroom is having students interact with subject area experts | T |
The traditional model of professional development training is remaining fundamentally the same | F |
In instructor-led training, teachers typically sign up for a specific course or module, and, after com-pleting all the requirements, they receive credit for the training | F |
Forecasters project that, by 2014, over 66 million K-12 students, including elementary students, will take at least one online class | F |
Many educators feel that virtual learning has little potential to improve the quality of instruction | F |
There are various types of online school programs that run from fully online schools to those that are partially online | T |
A virtual school, as illustrated in the accompanying figure, differs from the traditional school by offering all student services, instruction, activities, communications, and courses online using Internet technology | T |
All virtual schools like the kind illustrated in the accompanying figure are publicly funded | F |
All virtual schools like the kind illustrated in the accompanying figure need not provide a secure In-ternet experience | F |
The LMS supports the benefits associated with interactive and participatory learning, and it includes the use of examples, observations, discussions, experiences, situations, rules, interactive games, content-based concepts, and instructional techniques t | T |
In a hybrid enrollment program, students can enroll in one or more online undergraduate courses at the participating college or university while they are still in high school | F |
The kinds of learning illustrated in the accompanying figure combine F2F instruction with eLearning instruction | T |
As teachers create and implement online courses, they need to adjust their teaching approach to accommodate the differences between teaching in a virtual environment and teaching F2F in the classroom | T |
Being an early adopter of technology tools and devices is required in order to teach online | F |
In addition to training, one of the best ways to prepare for a new online teaching job is to ask ques-tions | T |
Uncertainty or assumptions about what students understand and their skill level when entering your class could provide a frustrating experience for the learner and the teacher | T |
The first step in the creation of a Web site is to post the content online | F |
There are many software programs available to help you create Web resources, but you really need to have a lot of technical skills in order to get your class Web page up and running | F |
With the emergence of Web 3 | |
0 tools, an increasing number of Web sites allow users to group, chunk, and organize bits of information to share with others | F |
Because a blog entry is like a traditional journal or diary entry, it typically includes the date, ideas on a topic of interest, and the signature | T |
A blog can be used to record and organize data, storyboard and plan, and ultimately create projects and other classroom activities | F |
Once you have recorded and exported your podcast in the RSS file format, you are ready to create your MP3 feed and then upload your podcast to the server for others to download and listen to | F |
Podcasts enable students and teachers to share all kinds of information with anyone at any time | T |
Many college and university professors Web-enhance their classes, giving students online access to supplemental course information | T |
Walden University is one of the leading fully accredited 100 percent online universities in the world | T |
Moodle and Drupal are commercial LMS software packages | F, open-source, open source |
A Credit Restoration program provides a student with a way to regain credit toward graduation for a course for which the student was previously unsuccessful in earning academic credit | F, Recovery |
Some virtual schools are creating their own apps because they are perfect solutions for on-demand learning tools for today’s online digital students | t |
Educational practices are at a(n) ____________________, which is defined by Malcolm Gladwell as "the levels at which the momentum for change becomes unstoppable | Tipping Point |
____________________ refers to courses in which the instruction is directed by an instructor teaching the class online | Instructor-led |
____________________ refers to courses in which the learner goes through the content at his or her own pace | Self-paced |
A one-way Webinar broadcast is usually called a(n) ____________________ | Webcast |
A(n) ____________________ requirement means that students must spend a certain percentage of their time on a traditional campus | in-residence |
____________________ school refers to a traditional school with physical buildings for teachers and students together | Brick-and-mortar |
In a virtual school, as illustrated in the accompanying figure, teachers, students, and parents must all feel confident that the information stored about them as a result of taking a course is ____________________ | secure |
____________________ can be created through the use of programs like Jing, which is available for free | Screencasts |
____________________ states that "anything that can go wrong will go wrong | Murphy's Law |
Google ____________________ is a Web site that offers free space and makes it easy for you to create customized content in a few minutes | Sites |
You can use ____________________ to engage your digital students in powerful learning activities using the Web-based tools, such as Blogger, that they relate to | blogging |
A single page in a wiki is referred to as a(n) ____________________ | wiki page |
The host or author of a podcast is often called a(n) ____________________ | podcaster |
A(n) ____________________ can be downloaded to a computer on many mobile devices, such as smart phones and iPods, and downloaded automatically using programs capable of reading feed formats, such as RSS or Atom | podcast |
A(n) ____________________ is an explicit set of criteria that the student can use to self-evaluate his or her work prior to submission and that the teacher can use to provide feedback to the student | rubric |
____________________ assessment is the assessment of online teaching strategies, technology resources, online communications, eLearning activities, and online assignments in which technology and Web 2.0 tools are used | Online |
____________________ is the process of critically reviewing the quality of one's own performance | Self-assessment |
____________________ is the process of evaluating the work and activities of another individual or group | Peer-assessment |
A well-known virtual-reality technology is ____________________, which is a virtual world use for communication, social networking, presenting, sharing content, and collaborating | Second Life for Educators |
____________________ learning is the use of curriculum specific apps to supplement online teaching and learning | App-based |
Which of the following is NOT something that she tells you your students can do using blogs | Cre-ate an easy, simple student-centered Web site |
Your fellow teacher offers you a lot of advice for how to lessen the risks of inappropriate entries on your classroom blog. Which of the following is NOT a recommendation she is likely to make to you? | Use a blog even if blogging is not part of your school's Acceptable Use Policy. |
Which of the following is a potential use for a wiki, according to your friend | Facilitating group au-thoring, Providing storage for data collection, Acting as a repository for content, All of the above |
Which of the following is NOT a potential use for a wiki | For creating podcasts |
To ____ is to determine the value or to judge the worth of an item | evaluate |
To be considered appropriate, educational technology like that shown in the accompanying figure must ____ | be motivational, be suited to the educational situation, support learning at the cor-rect level of student ability, all of the above |
The ____ of educational technology like that in the accompanying figure is important before instruction begins, during the instructional period, and after instruction has taken place | evaluation |
When evaluating educational software like that in the accompanying figure, ____ is the most im-portant area to consider | content |
____ means the software like that shown in the accompanying figure has well-grounded instructional properties, provides appropriate content, and teaches what is intended | Valid |
A technology ____ is a meeting dedicated to provide a vast array of information and resources for teachers, including workshops and presentations by educators on hundreds of technology topics | conference |
The ____ is the most comprehensive source of tools and resources to help you evaluate educational technology | Web |
A(n) ____ is a detailed scoring guide for assessment | rubric |
____ is any printed or online information that provides assistance in installing, using, maintaining, and updating the software | Documentation |
____ is a service that hardware and software manufacturers and third-party service companies offer to customers to provide answers to questions, repairs, and other assistance | Technical support |
____ refers to a student’s current competency level or the skill level the student can achieve for a specific learning objective | Ability level |
____ is based on grade level with increments to determine if a student is performing at the appropriate level | Academic level |
How well software or an app presents itself and how well it works is referred to as ____ | technical quality |
____ refers to the credibility of the person or persons who author and maintain the Web site | Authority |
A simple way to determine the ____ of a site like the one in the accompanying figure is to examine the URL and domain name to identify what type of organization maintains the Web page | affilia-tion |
____ is the process of determining or interpreting the intent or purpose of the Web page | Objectivity |
Web page ____can be provided using a variety of media to convey facts, opinions, and news | content |
The ____ is the individual or group intended to view and use a given Web page | audience |
If a Web page is a good one, it will state clearly when the page was last revised or updated to show ____ | currency |
The ____ of a Web site is the way it is arranged | design |
____ Web sites is an important aspect of maximizing the value of the Web, for teachers and students, both in and out of the classroom | Evaluating |
Traditionally, teachers use many different evaluation techniques in the final stage of instruction or when assessing ____ | student performance |
When integrating technology, some teachers and schools are moving towards a nontraditional ap-proach of student assessment, known as ____ assessment | alternative |
____ assessment measures learning by testing a student’s ability to master practical benchmarks | Authentic |
Learning experiences that demonstrate real-life connections between lessons and the world are called ____ learning | authentic |
Project-based assessment is an innovative approach of assessment that focuses on ____ | student projects |
A portfolio assessment ____ | is an evaluation of student assignments or projects over a period of time |
A(n) ____ is a predetermined list of performance criteria | checklist |
A more complex form of a checklist that lists a numerical value, or rating, for each criterion is called a(n) ____ | rating scale |
Which of the following is NOT a valid assessment tool for technology-based student projects? | col-league viewpoints |
Software planning tools such as ____ help students and teachers quickly develop and communicate ideas using flowcharts, concept maps (like the one shown in the accompanying figure), and story webs | Inspiration |
____ learning techniques are methods that present ideas and information through graphical webs | Visual |
When evaluating student projects, teachers should consider students' originality, imaginative and innovative approach, and artistic abilities – all aspects of ____ | creativity |
To help meet the constant challenge of motivating students to learn, teachers must change their traditional roles to become ____ of learning | facilitators |
School computer labs are used often to teach technology skills or subject-specific skills ____ the rest of the curriculum | isolated from |
As shown in the accompanying figure, a(n) ____ is a teacher-created document that contains hyperlinks to teacher-selected Web sites that assist in teaching content-specific curriculum objectives | curriculum resource page |
____ curriculum usually includes instruction in reading, writing, listening, viewing, speaking, and literature | Language arts |
____ curriculum usually includes instruction in history, geography, civics, and economics | Social studies |
____ curriculum usually includes instruction in all curriculum areas with adaptations made for stu-dents with unique characteristics or special needs, including students who are gifted, learning disa-bled, physically disabled, emotionally disabled, or men | Exceptional education |
A ____ is a document provided by the grant source that details the information teachers and schools need to write a successful grant proposal | request for proposal (RFP) |
Evaluation of educational technology involves determining if the technology ____ | is appropri-ate, enhances the teaching process, enhances the learning process |
The evaluation cycle includes evaluation ____. | during instruction, after instruction, before instruc-tion |
A well-designed Web site is determined by ____ | the ease with which content is delivered to the user, the way it uses instructional design principles |
Teacher observation involves ____. | having teachers notice when students are highly motivated during the learning process when technology is used, observing how long the students work on a given objective, observing the length of time students will continue a task in order to master the con |
Which of the following is a suggestion for integrating technology in a one-computer classroom? | enhancing lectures and presentations, obtaining Internet access, creating a class blog, maintaining a student database |
To evaluate is to determine the value or to judge the worth of an item | T |
Colleagues usually are not a good resource for identifying potential software and other resources | F |
Once you have identified a particular software package or an app potentially suited to your curricu-lum needs, you should purchase it before you evaluate the software. | F |
Ability level refers to a student's current competency level or the skill level they can achieve for a specific learning objective | T |
All of the information on the Web is placed there by reliable sources | F |
A Web site on asteroids by a distinguished astronomy professor has more authority than an astron-omy Web site created by an amateur stargazer | T |
A site with a .com domain is operated by an entertainment business; as shown in the accompanying figure, an .edu domain is controlled by a government institution | F |
An effective Web page loads in a reasonable amount of time, has a pleasing visual appearance, and is easy to navigate | T |
To integrate technology effectively into the curriculum requires planning, time, dedication, and re-sources | T |
Evaluating the effectiveness of technology is an easy task | F |
Project-based assessment is an innovative approach of assessment that focuses on assessing student projects | T |
When used for assessment, teacher observation is a set of evaluation criteria that specifies the re-quired characteristics for each level of quality, usually identified by a number or level of points earned | F |
Student projects should be interesting and unique, but should not reflect an understanding of the content | F |
Teachers only should evaluate the learning experiences after the instruction has taken place | F |
There are very few ways to integrate educational technology with only one computer in your class-room | F |
Teachers can divide centers by subject area and then create activities that continuously change to match the curriculum or lessons being taught | T |
Using a computer lab can offer teachers instructional opportunities that are not possible in a one-, two-, or even a five-computer classroom | T |
A Web scavenger hunt is an inquiry-oriented activity in which students explore the resources of the Web using discovery learning to find answers to teacher-created questions | T |
Planning is one of the most important variables for good instruction | T |
Language arts curriculum usually includes instruction in history, geography, civics, and economics | F |
Teachers are finding that many of the technology resources and integration activities can dramatically enhance the instruction of students with special needs | T |
at all levels throughout the district | F |
The grantee is the teacher, school, or organization to which the grant funds or equipment are trans-ferred | T |
A document provided by the grant source that details the information teachers and schools need to write a successful grant proposal is called a reasonable form proposal (RFP) | F |
A rubric is a detailed curriculum for assessment, based on stated criteria | F, scoring guide |
___________________________ Learning progression is when the content engages students to use higher-order thinking skills | F, process |
___________________________ Judgment is any method used to understand the current knowledge that a student possesses | F, Assessment |
___________________________ A flowchart is a drawing that allows students to design and layout a project or assignment before creating it on a computer | F, storyboard |
___________________________ Social centers are an effective way to create a flexible learning environment with many options for students | F, Learning |
___________________________ ____________________ educational technology like that in the accompanying figure involves determining if the technology is appropriate and if it enhances the teaching and learning | Evaluating |
Educational technology must be suitable for the educational situation, must be motivational, and must promote learning at the correct levels of student ability and academic achievement to be con-sidered __________________ | appropriate |
The ____________________ is the most comprehensive source of tools and resources to help you evaluate educational technology | Web |
A(n) ____________________ should list a number of important evaluation criteria, including content, documentation and technical support, ability and academic levels, and technical quality and ease of use | software/app evaluation rubric |
____________________ refers to a student's current competency level or the skill level he or she can achieve for a specific learning objective | Ability level |
____________________, or user-friendliness, refers to anything that makes the software easy to use | Ease of use |
____________________ refers to the professional organization, school, school district, university, company, or government office with which a particular Web site, like the one in the accompanying figure, is connected or associated | Affiliation |
____________________ is the information a Web page provides | Content |
The ____________________ is the individual or group intended to view and use the Web page | audience |
A(n) ____________________ is a detailed scoring guide for assessing the value and content of Web sites | Web evaluation rubric |
Traditionally, teachers use many different evaluation techniques in the final stage of instruction or when assessing _____________________ | student performance |
____________________ involves using nontraditional methods to determine if students have mastered content and skill level | Alternative assessment |
____________________ refers to alternative ways to evaluate students' performance to determine how well and in what way students are able to accomplish learning objectives and standards | Authentic assessment , Project-based assessment , Portfolio assessment |
____________________ is a model for teaching and learning that focuses on creating learning opportunities for students by engaging them in real-world projects where they have an active role in completing meaningful tasks, constructing their own knowledge, | Project-based learning |
A(n) ____________________ is similar to a checklist, but describes in greater detail the criteria and components that must be present to determine the extent to which learning outcomes are achieved | rating scale |
A(n) ____________________ like the one in the accompanying figure helps students use flowcharting to understand attributes of the main subject and provides a visual tool for brainstorming and planning | concept map story web |
The most effective way to integrate technology is to place the technology at the ____________________ – the classroom | point of instruction |
A(n) ____________________ is an inquiry-oriented activity in which students explore the resources of the Web using discovery learning to find answers to teacher-created questions | Web scavenger hunt |
____________________ usually includes instruction in basic number concepts, measurements, geometry, algebra, calculus, and data analysis | Mathematics curriculum |
The majority of outside funding sources for technology fall under a general category called ____________________ | grants |
You would like preview software and speak with other teachers who have used the software. Which of the following would be the best place to get that information | technology conference |
You would like to get candid advice about outstanding products, at the same time that you learn about which products to avoid from a source with firsthand experience. Which of the following would be the best source for that information | colleagues |
Which of the following locations would offer all students hands-on experience with technology for the purposes of drill and practice, remediation, collaborative learning, and tutorials, for example | computer lab or media center |
Which of the following locations would be best for having students complete a Web scavenger hunt? | computer lab |
A computer security risk is defined as any event or action that could cause loss of, or damage to, ____ | computer equipment , data and information, software, all of the above |
All of the following are true concerning viruses like those described in the accompanying figure EX-CEPT ____ | many viruses are generated by chance |
A ____ virus replaces the program that is used to start the computer system with a modified, infected version of the startup program | boot sector |
A ____ virus inserts virus code into program files | file |
A ____ virus hides within or is designed to look like a legitimate program | Trojan horse |
A ____ virus hides virus code within an application such as a word processing or spreadsheet docu-ment | macro |
A ____ is a program that is activated when a certain condition is detected | logic bomb |
A ____ is a program that is activated on a specific date | time bomb |
A well-known time bomb virus is the ____ virus, which destroys files on March 6 | Michelangelo |
Antivirus programs like the one in the accompanying figure also are called ____ | vaccines |
In addition to detecting viruses and inoculating against them, antivirus programs like the one in the accompanying figure can ____ | repair infected programs and files |
A(n) ____ disc is normally a CD that contains an uninfected copy of key operating system commands and startup information that enables the computer to restart correctly; this kind of disc may be required in some circumstances by the program in the figure | rescue |
____ is the use of a computer system without permission | Unauthorized access |
____ is the use of a computer or data for unapproved or possibly illegal activities | Unauthorized use |
All of the following are tips for creating passwords EXCEPT ____ | use a close relative or your child's name |
Any item that you must carry to gain access to a computer or computer facility is called a(n) ____ | possessed object |
A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network is called a(n) ____ | firewall |
The most common type of software theft is ____ | software piracy |
Software licenses like the one in the accompanying figure are agreements that ____. | provide specific conditions for use of the software, users must accept before using the software, outline the rights to use the software, all of the above |
An antipiracy technology designed to verify that software products have been legitimately licensed by licenses like the one in the accompanying figure is called ____ | product activation |
Software that is distributed free for a trial use period is called ____ | shareware |
Software that is provided at no cost to a user by an individual or company is called ____ | freeware |
A ____ allows network users to share a single copy of the software | network site license |
A ____ gives an entire region or state the right to install an unlimited number of educational copies of a software program | community/state site license |
A(n) ____ occurs when the electrical power supply drops | undervoltage |
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts | overvoltage |
A(n) ____ is a complete power failure | blackout |
A(n) ____ is a prolonged undervoltage | brownout |
Surge protectors ____. | smooth out minor voltages, provide a stable current flow, keep overvoltages from damaging computer equipment, all of the above |
____ is a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient | Phishing |
____ is a service that blocks e-mail messages from designated sources | E-mail filtering |
____ applies to all creative works and provides certain rights to authors | Copyright |
Copyright laws ____. | protect original materials created by students and teachers posted on the Web, apply to all creative works, are contained in the Copyright Act of 1976 and its numerous amendments, all of the above |
Fair use guidelines allow ____ | educators to use certain copyrighted works for nonprofit educa-tional purposes |
____ prevents your browser from displaying materials from targeted sites or sites that contain cer-tain keywords or phrases | Filtering software |
A(n) ____ is a set of rules that govern the use of school and school district computers, networks, and the Internet | Acceptable Use Policy (AUP) |
A(n) ____ is a teacher-created document or Web page that contains hyperlinks | curriculum re-source page |
____ computing involves reducing the use of electricity and the production of environmental waste while using a computer | Green |
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints | MSD |
____ studies have shown that using the correct type and configuration of chair, keyboard, display device and worksurface helps users work comfortably and efficiently, and helps protect their health | Ergonomic |
A person who tries to break into a computer system is called a ____. | cracker, hacker |
Computer vandalism includes ____. | a student cutting a computer cable, a student deleting im-portant computer files, individuals breaking into a school and smashing computers |
A single-user license typically includes the following condition: ____. | users may make one backup copy of the software, users may not give copies to friends, users may install the software on only one computer |
An area of computer ethics frequently discussed includes ____ | information privacy, copyright issues , software theft |
Objectionable materials located on the Internet include ____ | racist literature, obscene videos, obscene pictures |
Any illegal act involving a computer generally is referred to as a computer crime | T |
Most viruses like those described in the accompanying figure are harmless pranks that cause no permanent damage | F |
Viruses like those described in the accompanying figure commonly infect computers through e-mail attachments | T |
A worm is a malicious software program that hides within a legitimate program | F |
A logic bomb virus is activated on a particular date | F |
An antivirus program like the one in the accompanying figure also is called a serum | F |
Antivirus programs like those in the accompanying figure work by looking for programs that attempt to modify the boot program, the operating system, and other programs | T |
Unauthorized access is the use of a computer system or data for unapproved purposes | F |
A proxy server screens all incoming and outgoing messages | T |
A software license, an example of which is shown in the accompanying figure, is an agreement that provides recommended conditions for use of the software; however, users do not have to accept these recommendations before using the software | F |
A community/state site license normally does not provide substantial savings over single-use licens-es | F |
A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed | T |
Schools should never store backup copies at an off-site location | F |
By acquiring data from public and other sources, national marketing organizations can create an electronic profile of an individual | T |
Spam is a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain per-sonal and financial information from the recipient | F |
Spam sent via Internet Telephony is called split | T |
Fair use guidelines allow teachers to use any copyrighted works for educational purposes without any restrictions | F |
Copyright laws protect original materials created by students and teachers and published on the Web | T |
Teachers always must protect the identity of their students on student and teacher Web pages | T |
Filtering software programs prevent access to all objectionable and inappropriate materials | F |
While an outstanding educational tool, curriculum resource pages will not significantly reduce the chances that students will view inappropriate Web sites | F |
The largest job-related injury and illness problems in the United States today are repetitive strain injuries (RSI) | T |
CVS has serious and long-term consequences | F |
Many display devices and keyboards have features that help address ergonomic issues | T |
Due to emerging technologies (primarily wireless technologies, tablet computers, and apps) public education is undergoing profound and fundamental changes | T |
The daVinci virus destroys data on March 6, the date of the artist’s birth-day_________________________ | F, Michelangelo |
Product registration is an antipiracy technology designed to verify that software products have been licensed legitimately_________________________ | F, activation |
Cryptogram is the process of converting readable data into unreadable characters by applying a for-mula that uses a code as shown in the accompanying figure_________________________ | F, Encryption |
The Copyright Act of 1976 established legal use and provided the guidelines that allow educators to use and copy certain copyrighted materials_________________________ | F, fair |
Biometrics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace_________________________ | F, Ergonomics |
A(n) ____________________ is defined as any event or action that could cause loss or damage to computer capabilities | computer security risk |
A(n) ____________________ replaces the program used to start the computer system with an infected version | boot sector virus |
A(n) ____________________ is a type of logic bomb that is activated on a particular date | time bomb |
A(n) ____________________ is designed to detect, disinfect, and protect computers and networks from viruses like those in the accompanying figure | antivirus program ,vaccine |
False warnings about viruses that often spread via e-mail and over the Internet are known as ____________________ | virus hoaxes |
People who try to access computer systems illegally are called ____________________ | crackers, hackers |
Possessed objects are often used in combination with a(n) ____________________ that is a numeric password that provides an additional level of security | personal identification number (PIN) PIN (personal identification number), personal identification number, PIN |
As shown in the accompanying figure, a(n) ____________________ is an agreement that provides specific conditions for use of the software, which users must accept before using the software | software license |
The most common type of license included with software packages purchased by individual users is a(n) ____________________ | single-user license, end-user license agreement, EULA, end-user license agreement (EULA), EULA (end-user agreement) |
A(n) ____________________ gives the buyer the right to install software on multiple computers at a single site | site license |
A(n) ____________________ allows network users to share a single copy of the software, which resides on the network server | network site license |
A(n) ____________________ is a malfunction of a computer system | system failure |
A complete power failure is called a(n) ____________________ | blackout |
A(n) ____________________ contains surge protection circuits and batteries that can provide power during power outages | uninterruptible power supply, UPS, uninterruptible power supply (UPS), UPS (uninterruptible power supply) |
In case a file is corrupted or destroyed, a user can utilize the backup copies to ____________________, or reload, the files on a computer | restore |
Storing backup copies at another location, called a(n) ____________________, is an additional precaution often overlooked by schools and home users | off-site location |
Moral guidelines that govern the use of computers and information systems are called ____________________ | computer ethics |
____________________ is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once | Spam |
A(n) ____________________ program attempts to remove spam before it reaches your inbox | antispam |
____________________ is a health-related condition with symptoms including sore, tired, burning, itching, or dry eyes | Computer vision syndrome, Computer vision syndrome (CVS), CVS (Computer vision syndrome), CVS |
You discover that the computer has limited resources and shuts down frequently. Which of the fol-lowing viruses might your computer have? | |
worm | You discover that your computer's boot program is infected. Which of the following solutions should you try? |
rescue disc | You receive a call from your bank indicating that a large amount of money has been withdrawn. Which of the following is a likely cause of someone obtaining your personal and financial infor-mation? |
phishing | You receive a great deal of e-mail from companies trying to sell something. Which of the following is a likely cause of all the e-mail? |
spam |