Original PPT slides: il2-00.pdf
If the lecture is split between two rooms, how well could flipping the class actually work?
How will the staff be divided between the two rooms?
What social media or other systems can we prepare and use to engage the students?
Need help with effectively using social media (Pr. Liang? Mr. Katsuma?)
METALEARNING
Each week: Students submit three sources of online information that they used. For search engines, say what search terms or phrase was used. For other sources, say how the source was found. For each source: how high is your confidence in the quality of information?
What is the preferred method of
Reinforce learning through active reflection.
Or motivate learning by orienting material towards student interests.
Use active/literate materials to present and demonstrate concepts interactively offline
http://www.instructionaldesign.org/theories/experiential-learning/
http://www.instructionaldesign.org/theories/constructivist/
https://artofeducation.wordpress.com/2012/05/08/differentiated-instruction-3/
http://www.tecweb.org/styles/gardner.html
https://www.usuniversity.edu/login/computer-literacy-tutorials/
Intro
Course personnel and web site.
Course outline: information, digital, computer, and general literacy.
In this course we concentrate on the practical aspects of using computers to communicate any kind of information effectively. We will cover many different aspects about how to find, retrieve, store, manipulate, and share information using computers and networks in a safe and efficient manner.
Interactive vs. non-interactive. Advantages and disadvantages.
Still the standard communication tool in professional life (academic, industry). E-mail paradigm: sender, encoder, transport, decoder, recipient. Parts of the e-mail message: date, from, to, cc, bcc, subject.
Note on presentation style: the main points below are presented descriptively (not prescriptively) as solutions to questions intended to encourage intuitive understanding
etc.
Dear Katsuma-san, Information received - thank you! Regards, Ian
Documents attached to an e-mail message.
E-mail is a potential way an attacker can inject viruses or malware into your computer, or steal your personal information (rapidly followed by your personal money, possessions, etc.).
Most e-mail clients (Apple iMail, Mozilla Thunderbird, etc.) let you set up filters to perform automated actions on your e-mail.
There are lots of them. They typically differ from e-mail either because
Informal channels, not so useful for work: Instagram, Facebook
Informal channels that can be useful for work: SMS, Line, etc.; e.g., for announcing your train is delayed and you will be late for a meeting
Formal channels that support work: Slack, MS Teams, specialised sites like github.com for software development (issues, bug tracking, task assignment, etc.)
Faculty and managers and more likely to prefer email while students and new hires may be more likely to use texting for their primary communication.
Text messages are brief and come with the expectation that they will be quickly answered within a few minutes to a couple of hours. E-mails are often longer and a response may not be expected for 1 to 2 days. E-mails are more likely to be classified and saved, and referenced again long after they were sent. Because they are brief, text messages tend to be condensed, be more informal, and use more abbreviations. Follow these general guidelines when texting in a professional setting:
We could also reverse this: Mr. Katsuma sends an e-mail to the entire class, and everyone has to “reply-to-sender” with the requested information.
Find an image that you like a lot (either on the Internet or a personal image that is OK to share). Download it. Compress it into a .zip file. Write an e-mail to: katsuma.yoshiyuki@kuas.ac.jp and attach the .zip file with the image to the message. In your message:
Mr. Katsuma will respond to you with a short question (actually, four questions but we won't say so at first):
Dear course member, Thank you for your e-mail and the attached image. Can you tell me... 1. Why did you choose that image? 2. Where did you get the image? 3. What do you think are the four most important rules that you should always do when using e-mail? 4. What are four examples of things you should not do when using e-mail? Looking forward to your reply! Regards, Katsuma Yoshiyuki
Reply to him, quoting his question(s), and responding to each of them in-line.
Grading
10 points maximum for
Simple text editors for trivial documents: Notepad, TextEdit, LeafPad
Serious text editors
Desktop publishing
Online resources: MS's own tutorials
Set your Word UI language to English!
Setting your author name and initials, default paper size, spelling and auto-correction preferences, character encoding (always use UTF-8), etc.
Either: create a short document about yourself (home town, hobby, favorite things, etc.)
Or: download a prepared Word file that contains a “literate tutorial” covering
TBD
Presentation software: making slides, page templates, images and drawings, export as PDF, math formulae Output formats: PDF for sharing and printing
Golden rule:
Make a short article or slide show on a topic of interest, including graphics or photos.
Save as PDF and e-mail it to the instructor.
Or: in-class engagement activity
TBD
Spread sheet software: tabulation, formulae, import/export as CSV files tricks to anchor cell references, graphs and charts
TBD
TBD
Why using the command line to access your files will make you five times more productive and a more effective engineer
Finder/Explorer vs. the command line
TBD
TBD
Why using the command line for everything will make you ten times more productive and a more effective engineer
Searching, sorting, modifying, analysing data in text files ===
http://swcarpentry.github.io/shell-novice
Commands and arguments versus words in text Searching, sorting, modifying, analysing data stored in text files using command-line tools Standard input and output, pipelines: combining simple commands to perform more complex tasks using CSV and text files (e.g., from “office” tools) as simple databases Editing plain text files
Extract, analyse and generate a report on the contents of many files.
E-mail the script, and its results, to the instructor.
TBD
Rationale: files are the first “concrete” objects students formally encounter, so they make a natural target for automated processing.
Operating on on one file ⇒ performing bulk operations on many files
Saving sequences of shell commands to automate a process.
TBD
TBD
TBD
TBD
Combining scripting and command-line tools for data management. Search/organise music/photo collection by tags, simple catalogue card deck, etc.
E-mail the script and results to the instructor.
TBD
web, ssh, mail, …
media bias and the importance of original research
https://edu.gcfglobal.org/en/topics/internet/
TBD
TBD
The network is the computer
Network file systems: NFS, SMB, AFP
File transfer protocols and applications
Data distribution and file sharing
How to share very large files
Download a text file from a server, modify and edit it using command-line tools, upload the result (to where???).
TBD
The Internet vs. the World Wide Web
Uniform resource indicators and locators
Content delivery
Hyper-Text Transfer Protocol
Hyper-Text Mark-up Language
Anatomy of a simple web page
Using a browser as a previewer for local HTML files
Create a simple web page: “Hello, web!”
Send the page (or a URL to an online version) to the TA by e-mail
TBD
HTML and the structure of web pages
Common tags and content types
Style
Web page verification
Search Engine Optimisation?
Content management systems
Markup (HTML) vs. markdown (WP, Wiki, Github, …)
Hand-made web page on a topic of interest
TBD
Client-server model and HTTP POST requests
Automatic content generation
Server-side: PHP + database
Client-side: JavaScript
Structured data mobility: XML and JSON
your services run on a virtual computer (one rain drop in a cloud of identical rain drops)
the software is never out of date
there is no such thing as the cloud, it's just someone else's computer
your data is stored on someone else's computer.
your application runs partly on someone else's computer, partly on your computer
the software is never out of date
one way to obtain the benefits without the risks:
LAMP/MAMP stacks
open-source resources for self-hosted cloud services
use case | systems |
source code control | Gitea (git only), Phabricator (git, Subversion, Mercurial) |
project management | Phabricator (source code) |
portfolio management | Mahara |
collaborative document editing | Etherpad |
file synchronisation | Syncthing |
wiki | Dokuwiki |
comprehensive services | Nextcloud |
blog | Wordpress, Hugo |
TBD
TBD
Sensitive information
Effective use of passwords
Security basics
Malware, spyware, viruses, & M$ macros Effective backup strategies
https://edu.gcfglobal.org/en/internetsafety