Skip to main content

Posts

Showing posts from May, 2017

WECDSBcodes Challenge 4: Procedural Writing Smash Up

Students will design a path, describe it using procedural writing prompts and then measure the path taken using standard and non-standard units of measure.

Exploring By The Seat Of Your Pants

I have had the pleasure to sit in on some of the hangouts hosted by Exploring By The Seat of Your Pants.  As stated on their website, "The primary goal of Exploring By the Seat Of Your Pants is to knockdown classroom walls and take students anywhere in the world, never having to leave their desks.  We aim to accomplish this by connecting students with exciting guest speakers and virtual field trips from around the world.  Our focus is providing lessons related to science, adventure and conversation, but won't be limited to these areas!"

There are still camera spots available for some of their May events, you can check them out below:



The Turtle Hospital May 15th @ 11:00am EST Camera Spots Remaining: 5 The Turtle Hospital opened its doors 1986 with four main goals: 1) rehab injured sea turtles and return them to their natural habitat, 2) educate the public through outreach programs and visit local schools, 3) conduct and assist with research aiding to sea turtles and 4) work …

Increasing Your Digital Responsibility - Protect Yourself

Increase Your Digital Responsibility - Protect Yourself

Attempts from Hackers to steal your private information are getting more and more aggressive all the time.  Our IT Department filters out thousands of email a day containing malicious files, spam, and other unwanted garbage.

No matter how good our filter is some email gets through that you need to be on the look out for.  More than 70% of emails sent are spam.



4 Main types of attacks:

1:  The Imposter: Spoofing

These messages are designed to look legitimate and almost identical to the real thing.  There are some very easy tips to identifying the fakes! Look below in "What Can I do?"

For more information click here:

2:  The Sharp Shooter: Spear Phishing

Phishing attacks and spear phishing have much in common, including the shared goal of manipulating victims into exposing sensitive information. Spear phishing attacks differ from typical phishing attacks in that they are more targeted and personalized in order to increase cha…