Category: Computers

Spiral of Inquiry

My Inquiry question was: How can student motivation be increased in terms of Math?

My research was primarily through personal experiences of games that involved math. Some games I played in the past have a focus on probability and math which reinforced my base level knowledge in the area with specific actions.

https://boardgamegeek.com/boardgame/268922/30s

For a dice game “30” helped my thinking. The game is as follows:

You have 6 six sided dice and 30 “points” that you want to keep.

You roll the dice and need to remove and record at least 1 dice from the dice pool.

Reroll and repeat until there are no dice.

If the final total is below 30, you lose points equal to the difference and your turn ends.

If it equals 30 then nothing happens and your turn ends.

If it is more than 30 you reroll the dice again, keeping every die that is equal to the difference between your total result and 30. When a roll doesn’t have that number you remove the total that you collected from the next person (If you got 35 and rolled 3 5’s the next person would lose 15 points).

When you hit 0 points you are out of the round.

To follow intuitively you want as many 6’s as possible and grab as many of those that are available. getting 5’s results in a break even and less than that needs a 6 to balance it out. Getting a result of 1 needs 4 6’s to balance out. The conclusion I was led to after playing it several times is that if you have multiple 5’s in a roll only grab 1 of them since the more rolls make up for the result.

Practicum 1:

Dice off. In my class for the practicum 1 I had a game where my students made a die and put together a paper dice with the results written on them. They had to have the same average roll (adding each dice number together and dividing by the number of possible sides). Students were quickly able to determine the best option, have one result be as low as possible and maximize the other results. Because of the interfacing with each other’s dice it makes the most sense, though

If it is presented like a game then students will have higher investment in the game. Some students were less invested in making the dice, though whether that was the game or my presentation is uncertain.

Practicum 2:

In my second Practicum I had a few different games. I had students roll a 10 sided dice and colour in the results up to 100. Some student’s understanding of the 1s and 10s place meant that they had more difficulties with the concept. Those who had a better grasp of the concept enjoyed it significantly.

I also had a game involving making 10 with cards which was more enjoyed though most students had an understanding of which 2 numbers added together made 10.

My conclusion is that the games are better to reinforce the learning rather than be at the forefront of it. It would be better to start with some direct instruction about the topic so students have a better understanding of the concept before they start. Some students if they don’t get the direct instruction can learn from the game and vice versa. The game improves motivation since students enjoy games and if there is a trust that the direct instruction will be connected to the game then there should be more attention on the direct instruction.

Games as learning can be more effective if there’s immediate feedback, though allowing students to play video games might not go over well with the other staff, so that should be done after the particular games show their efficacy.

If a student has something they can do with what they are learning they will be more likely to be interested in the learning. Making the connection is the difficult part.

The internet is forever unless you want it to be

https://help.rockcontent.com/en/how-to-solve-404-error

The statement that “the internet is forever” is a pithy description of how someone should interact with the internet. Be cautious when sharing because something you share can spread exponentially, “going Viral” and then it becomes the defining moment of you on the internet. But when people use this saying that means that they don’t put in the effort to save and protect the things that exist.

Unlike the real world, internet spaces can disappear without any noticeable catastrophe. Because of this a large chunk of the early internet vanished under our noses. Particularly 38% of websites that existed in 2013 don’t today and those that were made between 2013 and now 25% of them are gone forever [https://www.pewresearch.org/data-labs/2024/05/17/when-online-content-disappears/]. This tendency will probably continue into the future so there will be websites that were used and beloved that fall and lose everything they remember.

Of course there are technologies that can remember websites for posterity or nostalgia. “The Wayback Machine” can save websites as they were so even when gone it is remembered.

https://web.archive.org/

The problem of actually using this and other methods to remember is two fold, that it currently exists so why should we bother and someone else has probably already done it.

The first concern makes sense since if 38% of websites that existed in 2013 don’t now, that means that 62% are still there. It is hard to conceive of the vulnerability of websites. Even if it is far less comfortable to think of the internet as vulnerable of disappearing at any moment, that is far more true than a perpetual unchanging space. Even real life spaces need maintenance to ensure they are safe and continue to follow their purpose. Some small effort from people who enjoy their websites to make sure that they can be remembered is an effort, like a backup of a critical document, will only be remembered and thanked when things go wrong.

“But why do I have to do it”

You don’t, but because of the bystander effect, the tendency of everyone to expect someone else to ‘do something’ many terrible things occur that should not. People don’t call to report a wildfire because “someone’s obviously already done it”. The loss of websites is hardly as important as ‘real world’ concerns, but even for the little it matters it still matters.

This brings me to Digital Citizenship and what I believe to be a critical part of this idea is that you should be responsible to save the things that you believe to truly matter. Citizenship contains both rights and responsibilities and since the internet doesn’t have its own space that can be forgotten. The right to access the things you like is directly connected to the responsibility to save and ensure that these things continue to exist.

You certainly can decide to ignore this, and it will probably be fine, but If no one saves it and If it vanishes from its original place then it can disappear as certainly as a burned painting in the real world.

Only you can make your corner of the internet forever.

ARC BC: A butterfly spreads its wings and we have unintended consequences.

If you print a link and I can’t see where it sends me how do I get there?

The Online Visit from Arc BC was an enlightening experience that ran over the same ground with many things that was worth remembering. What I specifically took from it is that legibility of text is important and there are few changes needed in order to make the text Easily understandable. I had before then (in my time at Harwin) made my text several units larger than “necessary” (15-16 point font) so I later on shrank the text size that I would accept printing for students to read.

I had some disagreements with the other sections since removing a visible link can cause unintended consequences.

The Idea of Having changing a link into something better for text to speech does make some sense, though it has some risks associated when proper care is not taken. If proper care is not taken this could give an opportunity for phishing and other schemes to have a weak link to break. As long as the teachers have proper security in their email there would be a very small risk that clicking on something that doesn’t immediately show where it sends you can be exploited. If it happens though then people habituated into clicking on a link that does not show where its sending you can have issues. There should be a way to ensure that neither those who need the text to speech nor those without the need can safely navigate emails though I do not have the particular expertise in the matter. Changes are rarely “good”, they simply trade one priority for another. If there has yet to be a scam over a school email then it is unlikely to be focused on so hopefully we never have to find out if this change will have a detrimental impact.

Altering the link can also have practical difficulties that need to be considered to understand the second order impacts of the change on a larger level. The largest second order impact I can consider is that if a link is altered then an image of the line, or a printed version, would be entirely unusable compared to the raw link. This needs to be considered if something is going to be sent out in printed form, since accessing parents can be done through different mediums these considerations need to be made, be it two versions of a note or footnotes to sequester that which does not play well with a text to speech program.

Of course all that really is needed is understanding and empathy along with the wisdom to consider the consequences of decisions and mitigating the unintended results.

Digital Literacy and the burnt finger

There is one main attack vector that no antivirus software could possibly protect against.

You.

Specifically this is the individual who uses the computer. There are always possibilities for the individual to bypass their own protection if they believe that there is no issue with what they are doing. This means that the chance that people get attacked by malware or a scam depends on their proper discretion with respect to the internet and what is expected.

There was an occsion at a local Walmart where I saw a printed page taped to the gift card kiosk insisting that there is no government institution that requires payment in prepaid depit card numbers.

This might be something that people would scoff at, but if you’ve ever encountered a scam that you immediately understood was a scam then you weren’t in the target audience.

Personally I was attacked by a Scam by my first cell phone. Someone called and insisted that they were part of Telus and could renegotiate a better cost for the plan. I was using prepaid cards, so I wasn’t really interested in the offer, but didn’t refuse outright because I was a younger and less confident person. I told them I wanted to wait for a week. When they asked for my credit card information a week later I simply denied their offer and hung up. Only a year later I realized that they were not in the proper system and most likely a scam.

What are some ways to frustrate scammers or internet bad actors?

  • Ensure You are aware of what could compromise your computer
  • Make different passwords that you can remember. Or if you are going to use the same password for different things only use that for websites and programs that have no value and are not used for your work.
  • Differentiate your systems. If you can afford it it is helpful to have a designated system for your work. This can ensure that if you make an oopsie then it is not catastrophic.
  • Have a backup that is current. If you can make a backup for your system that is updated regularly then there will be less issues if there is a catastrophic failure. This is also useful outside of the problems of bad actors since a computer does have elements that can break. If they do then there’s pretty much nothing that can be done.

With respect to students there are many skills that they need to build up to even understand the internet on a fundamental level. Beyond the knowledge of the past that was difficult to find now students need to navigate a place where there is far too much information to critically engage with each piece of it. Some of them are even “True”.

The Fundamental skill that Students need to learn, and is most difficult to teach, is Curation.

“Knowing how to find reliable information” is the ultimate skill that people cannot teach. From understanding that any difficulties with scams are unnecessary. The ultimate question is how to teach students that the internet stove is hot without letting them get burnt.

The Digital Footprint, Permanent and Particular

The internet is forever

So said by those who chastise people trying to remove their personal information off the internet and undo their infamy for whatever reason. It is best to understand this, and the extent of one’s digital footprint, before they encounter an undesirable situation.

The Canadian Center for Cyber Security gives the essence of the issue, that “Digital footprints contain sensitive information that is valuable to cyber threat actors”. That is that information is valuable, and just because your information is trivial to you does not mean it is universally useless to the “Hackers”.

Sourced from https://imgflip.com/i/6dorce via Google.

The reasons why this information is desired is due to the usefulness of this information. Google, the purveyor of digital tracking has many methods of gathering wealth with information. With a sufficiently large amount of information it is possible to make use of “Big Data” in order to provide value, such as for example “Tracking consumer behavior and shopping habits to deliver hyper-personalized retail product recommendations tailored to individual customers” (What is Big Data?). This might be considered a good thing, but there are issues of data breaches that make the very personal data become essentially public, available to all the bad actors who want to use it for their own purposes. You might be hidden by anonymity, but does it make sense to rely on that?

The digital footprint is not just a single block of nondescript information and is generally divided into two sections, that which you choose to reveal and that which you don’t choose. The main area where you can make choices that impact your digital footprint is in the area of the things you choose, otherwise known as the Active Digital Footprint.

Returning to The Canadian Center for Cyber Security, the Active Digital Footprint includes:

  • Social Media Posts
  • Filled out Online Forms
  • Browser Cookies

What options are available follow from these, and seem quite simple.

“Read privacy policies and terms of use.”(Digital Footprint). This option is the most time consuming. What a corporation allows should be found on their terms and conditions, if they decide to act ethically. Furthermore at this point the program is often already purchased, which means that all the cost has been already sunk.

“Disable cookies, if possible”(Digital Footprint). Another simple choice. Many corporations and websites offer or order the user to allow cookies. Sometimes they make it optional, but if you believe that the site’s security might not be sufficient, then don’t make the data available.

Good Passwords. If you have one Password, then you place all your information and programs behind one digital key. There only needs to be one breach for everything to now be open. Make the passwords different, but rememberable.

Some advice on passwords. Remembering is better done in chunks, so if you are able to remember some parts of a password and put them together in new and unique ways it will be easier to remember than to have the perfectly unique password. This does cause some issues if you are predictable, but having some dozen parts of passwords that are permuted, re-arranged, and not used all the time can make a reasonably safe and remember able password. Putting a password on paper makes it available to anyone who sits at your desk, so is not suggested.

https://imgflip.com/i/6dorce

Digital footprint (ITSAP.00.133). Canadian Centre for Cyber Security. https://www.cyber.gc.ca/en/guidance/digital-footprint-itsap00133#defn-cyber-threat

‌What Is Big Data? (n.d.). Google Cloud. https://cloud.google.com/learn/what-is-big-data