Stay on the Path Lesson Four: Scavenger Hunt
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
In this lesson, students apply their searching and critical thinking skills to learn how to find legitimate online sources for downloading and streaming movies, music and videos.
In this lesson students learn how to create well-defined search strings and to use tools and techniques such as bookmarking, browser filters and search engine preferences to avoid unwanted material.
In this lesson students learn how to authenticate online information by comparing “facts” from the website www.allaboutexplorers.com with more authoritative sources.
If asked to think about community television (or public-access television, as a similar institution is called in the US) most people would probably conjure up the movie Wayne's World or its real-life analogue, The Tom Green Show: TV made by people who would, under normal circumstances, never appear on TV, shot in someone's basement or living room. Or perhaps they'd think of earnest, low-budget shows that showcase community events that wouldn't otherwise be televised, such as ethnic festivals or the Canadian Improv Games.
A recent case involving lawmakers who want to access data on the computer of a woman accused of engaging in a mortgage scam in Colorado has opened up a virtual Pandora’s box of legal questions: American courts are currently struggling with whether or not suspects can be forced to show authorities how to access their encrypted information and the repercussions of their ruling could affect Canadian law as well.
The hottest media story in the past week has been the instantly infamous New Yorker cover portraying Barack Obama and his wife Michelle as terrorists. Though the Obama campaign has been measured in its response, media outlets – and particularly bloggers – have been vocal in their disapproval. Some have suggested that the cover crosses the line from satire into hate speech, while others accuse TheNew Yorker of giving ‘aid and comfort to the enemy' by visually depicting the smears and misconceptions that have been aimed at the candidate.
One of the most noted aspects of the Internet is its anonymity: by and large, people online will treat you as whoever you say you are. In the West, this is often used for mischief or identity play, but in other parts of the world anonymity can have a much more significant and liberating effect.
People who make their living producing images, such as photographers, stylists, publicists, directors and pop idols, learn how to use those signs to convey the impression they want to make. Although teen girls who are trying to send a signal to their circle of friends and pop music producers who are trying to send a signal to an audience of millions are working on different scales, the principle is very much the same. Depending on your audience, you need to tailor the signals you send out very carefully. Even your age can have a certain amount of wiggle room when dressed in the right signs.
The last year has been an unusually busy one for watchers of gender representation in the news media, with not one but two high-profile women involved in the U.S. presidential race. The way in which these two politicians were covered provides a view of how gender in politics is portrayed in the media, and how this can help to explain just how unusual those two women are.
It’s ironic that as computers and other communications technology have become more accessible to the general public over the last thirty years, they have actually become less accessible to a segment of the population, one to whom access is everything: people with disabilities. More ironic still is that the history of communications technology is intimately tied to the drive to integrate people with disabilities more fully into society.