35. When surfing the internet, avoid “free” offers and protect your information! Chatting – guard your information unless You are 100% Sure who you are chatting with. Cookies aren’t just for eating, they may be sending your personal information to others . Protect your passwords like you would your wallet or car keys. Make it complicated ! E-mail is not secure and should never be though of as private. Don’t even open Spam , download a spam buster ! Beware of phishing, which are fake e-mails Sent to try to gain your personal and financial information. Protect your privacy on the Web
38. Blog Discussions Blog entries convey extensive evidence of a personal response to the issues raised in the readings and class activities / discussions and demonstrate the author's growth through reflection on learning & technology. Blog entries convey evidence of a personal response to the issues raised in the readings and class activities / discussions and demonstrate that the author is capable of reflecting on learning & technology. Blog entries convey a little evidence of a personal response to the issues/concepts raised in the readings and class activities / discussions Blog entries show no personal response is made to the issues/concepts raised in the readings and class activities / discussions Personal Response to Key Concepts Blog entries demonstrate engagement with the important issues raised through selected readings and/or prior modules. Many references are made Blog entries make some references to key issues raised through selected readings and/or prior class activities / discussions Blog entries make few references to issues raised through selected readings and/or prior class activities / discussions Blog entries make no reference to issues raised through selected readings and/or prior class activities / discussions Intellectual Engagement with Key Concepts 5 3 1 0