Unit+10

=ED 585| Integrating Technology into the Curriculum =

Overview
We are more and more relying on computers to create, store, and manage critical information. Because of this, it is important to ensure that computers and software are protected from damage, loss and misuse. In this unit, you will learn how to identify potential computer risks and the safeguards that schools and individuals can implement to minimize these risks. You will also learn about the ethical issues surrounding Internet usage, information privacy and intellectual property rights. You will also learn about the emerging technologies that will transform the traditional classroom.

Objectives
Upon completion of the unit, students will be able to:
 * Identify security risks that threaten home and school computers
 * Describe how computer viruses and malicious software programs work and the steps you can take to prevent viruses
 * Describe different ways schools safeguard computers and networks
 * Explain why computer backup is important and how it is accomplished
 * Define what is meant by information privacy and its impact on schools
 * Identify the components of copyright that impact education
 * Describe the ethical issues related to Internet usage and steps schools are taking to address them
 * Identify safe and healthy uses of technology resources

Topic 1: Computer Viruses
Any event or action that has the potential of causing loss of computer equipment, software, data is a computer security risk. Some examples of computer security risks are viruses, unauthorized access and use, information theft, etc. Computer crime is any illegal act involving a computer. Although computer crime seldom involves violence, it is far from a “victimless” crime. Every year, computer crime costs U.S. businesses and citizens billions of dollars.

A virus is a potentially damaging computer program designed to affect a computer negatively without a user's knowledge or permission. A virus is a segment of program code that implants itself in a computer file and spreads systematically from one file to another. Use Fig. 1 to view how a virus can spread. A boot sector virus is a virus that replaces the boot program used to start a computer with an infected version of the boot program. When the computer runs the infected program, it loads the virus into the memory, where it spreads to any disk inserted into the computer. A file virus is a virus that inserts virus code into program files; the virus then spreads to any program that accesses the infected file. A macro virus is a virus that uses the macro language of an application to hide virus codes. When a document is opened that contains an infected macro, the macro virus loads into memory. Certain actions, such as saving the document, activate the virus. Malicious software programs are viruses that include worms and Trojan horses. A Trojan horse (named after the Greek myth) is a malicious software program that hides within or is designed to look like a legitimate program. Worms are malicious software programs do not reproduce themselves; instead worms spread by indirect means. In addition to the Melissa worm and Michelangelo virus, other famous viruses include: ARPAnet virus (1980), brain virus (1987 at the University of Delaware), Lehigh Virus (1987 at Lehigh University), Bell Labs virus (1988), Israeli virus (1988 at Hebrew University), MacMag virus (1988), and the Concept virus (1990).
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Computer Viruses **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">It is important to have an antivirus program. Antivirus programs remove or repair infected programs and files. Define rescue disk and virus hoaxes. There are several antivirus software programs available, for example, Norton Antivirus and McAfee are probably the most popular. Antivirus programs should be set up to monitor a computer automatically for possible viruses. School computer lab managers should perform virus scans on student floppy disks before use in the lab and on all lab computers at the end of each day or before the day’s classes. For more details about antivirus programs, visit:[| http://www.symantec.com/index.htm]
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Virus Detection and Removal **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Topic 2 - Unauthorized Access and Use
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">A hacker is an individual who tries to access a computer or network illegally. Hacker was originally a complimentary word for a computer enthusiast, now with a derogatory connotation because it refers to people who try to break into a computer often intending to steal or corrupt its data. Hackers and crackers have a variety of motivations.

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">In 1996, Christopher Schanot, a 20-year-old hacker, confessed in federal court to breaking into two national computer networks, learning secret passwords, and changing files. Schanot allegedly was linked to the Internet Liberation Front, a group that resists commercialization of cyberspace and claims responsibility for several high-profile computer escapades.

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">In 1983, a group of teenage hackers supposedly broke into more than 60 business and government computers, including Los Alamos National Laboratory and the Sloan-Kettering Memorial Cancer Center. The media viewed these teenagers more as computer wizards than as criminals. Clifford Stoll’s The Cuckoo’s Egg is a fascinating book about computer hackers. Stoll tells how his search for the source of a 75 cent accounting error led him to a ring of hackers who were selling U.S. military secrets and security data to the KGB for money and cocaine. Stoll plays himself in a PBS Nova special, “The KGB, the CIA, the Computer and Me.” Stoll offers some unconventional views about computers and the Internet in his second book, Silicon Snake Oil: Second Thoughts on the Information Highway.

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Some organizations actually pay consultants to attempt to break into their computer systems in order to identify areas that need stronger controls. Unfortunately, the challenge of escalating deterrents and “impenetrable” security measures often serves as a motivation to hackers.

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">A possessed object is an item that you must carry to gain access to a computer or computer facility; examples are badges, cards, smartcards, and keys. A personal identification number (PIN) is a numeric password that provides an additional level of security. Biometric devices are devices that authenticate a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Possessed Objects and Biometric Devices **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">A firewall is a general term that refers to both hardware and software used to restrict access to data on a network. A proxy server is a server that functions as a firewall by screening all incoming and outgoing messages.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Firewalls **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Topic 3. Hardware Theft and Vandalism
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Preventive measures can be taken to guard against computer theft. Metal tags are one means of hardware identification used by educational institutions. Laptop computers pose special problems in schools. An insurer of PCs reported more than 200,000 incidents of theft or robbery of portable computers in 1995, costing almost $640 million. For more information about notebook computer security:[| http://articles.techrepublic.com.com/5100-10878_11-1055564.html]

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">The Software Publishers Association (SPA), together with federal marshals, have conducted several successful raids of organizations suspected of using pirated software. Some corporations argue that confusing (and often varying) software licensing policies, coupled with the proliferation of PCs (each with its own hard drive) and networked workstations, make it difficult to comply with strict standards for legitimate software use. Single-user license agreement, or end-user license agreement (EULA) are discussed on page 479 in your textbook. Companies or schools may reduce software costs by purchasing network versions for the maximum number of users expected to be online simultaneously. If additional users try to log on, the program rejects them. Other inexpensive sources of software are available including shareware, which can be tried before paying a fee, public domain software, which is not copyrighted and can be freely distributed, and freeware, which is provided at no cost to a user. Shareware, freeware, and public domain software can be excellent sources of software for classroom use. For lists of freeware available for PCs and Macintosh computers, visit: http://www.jumbo.com/
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Software Theft **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">For an overview of software and technology law: http://www.the-eggman.com/writings/piracy.html

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Information transmitted over networks or residing on portable computers presents a higher risk of theft. Encryption is a process of converting readable data into unreadable characters. Encryption key is a code that converts readable data into unreadable characters. “Encryption” comes from the Greek kryptos, meaning hidden. Security is the primary concern of most Internet users. For more information about encryption software: http://en.wikipedia.org/wiki/Encryption
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Information Theft **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Topic 4. System Failure
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">System failure is a malfunction of a computer that occurs because of electrical power problems, hardware component failure, or software error. The power supply is an important consideration when purchasing a PC for personal use, lab use, or as a file server. Undervoltage, brownout, blackout, overvoltage (power surge), and spike are discussed on page 481 in your textbook. Computers should be shut down as soon as possible after brownouts. Subsequent multiple surges can harm the computer, even if it is connected to a surge protector. An uninterruptible power supply (UPS) is a device that contains surge protection circuits and one or more batteries that provide power during a temporary or permanent loss of power. In addition to operating when power is completely lost, a UPS also cuts in when line conditions become unsatisfactory due to voltage levels, spikes, or other reasons. The UPS provides alternative power to permit a safe shutdown.

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. Backup procedures are procedures that outline a regular plan of copying and backing up important data and program files. Restore is a process of reloading files on a computer or network file server. Backup copies usually are kept at an offsite location. Virus protection is important in the backup process. If the primary data source is infected, the mirror-image backups also will be contaminated. In the case of a disaster, it is easier to obtain another computer and reload backup files than to recreate program and data files that may have taken months to develop. For more information on backup:[| http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci211633,00.html]
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Backing Up – The Ultimate Safeguard **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Topic 5. Ethics and the Information Age
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Computer ethics, like ethics in general, can be a contentious topic because not everyone agrees on what is right and what is wrong. In discussing computer ethics, you should be encouraged to state their views, while showing respect for the opinions of others. Visit the link below to explore Computer Ethics — Cyberethics: <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">[]

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Information privacy is a greater concern today than in the past. Americans are very concerned about their privacy. Many equate the growing use of computers with the increasing loss of privacy.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Information Privacy **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Information is collected and sold without authorization. While several laws imply a citizen’s “right” to view records, it is not always easy to do so. A number of offices or agencies often must be contacted, and many requests initially are rejected. States also have laws regarding information privacy. In an effort to make the state more attractive to high-tech industries, Oklahoma adopted a law making it a misdemeanor to break into a computer system, and a felony if records are destroyed, copied, or altered.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Unauthorized Collection and Use of Information **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Phishing is a scam in which a perpetrator sends an official-looking e-mail that attempts to obtain personal and financial information from the recipient.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Phishing **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Spam is unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Spim is spam sent through an instant messaging system. Split is spam sent via Internet Telephony. e-mail filtering is a service that blocks e-mail messages from designated sources. An antispam program is a program used to block unwanted e-mail messages that works by attempting to remove spam before it reaches an e-mail inbox. Sometimes anti-spam programs remove valid e-mail messages.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Spam **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Fig. 3 summarizes the major U.S. government laws concerning information privacy. Note the common points in these laws.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Privacy Laws **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Sequel Technology sells software called Net Access Manager that allows companies to monitor and control their employees’ activities on the Internet. The program lets managers read employee e-mail, restrict individual access to Web sites, and create reports on an employee’s Internet activity.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Employee and Student Monitoring **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Topic 6. Copyright
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Copyright is the retention of ownership of a work by the original author or creator of the work and giving the creator exclusive rights to reproduce and distribute the creative work. Copyright laws protect creators of original work. Copyright laws apply to software as well as written documents. For a crash course in copyright: <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">@http://www.lib.utsystem.edu/copyright/

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Fair use are guidelines that allow educators to use and copy certain copyrighted materials for non-profit educational purposes. The Copyright Act of 1976 has a clause on fair use which is an important clause for educators. Fair use guidelines allow educators to use and copy certain copyrighted materials for non-profit educational purposes. Copyright issues are complex and the laws sometimes are vague. Most school districts provide teachers with specific guidelines for using copyrighted materials in their classrooms. Schools can interpret copyright issues differently, however. School policies concerning the use of copyrighted materials can vary widely. For an example of a copyright statement on a Web page:[| http://ncteinbox.blogspot.com/2008/11/fair-use-and-copyright-for-educators.html] For more information on fair use: http://fairuse.stanford.edu/
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Fair Use **

//<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Teacher and Student Web Pages // <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Fair use guidelines do not apply to published teacher and student Web pages. There are a variety of resources students and teachers can access to find copyright free resources to use on their Web pages, such as public domain sites, for example (@http://www.loc.gov/families/): Teachers should review all school policies concerning the publishing of teacher and student Web pages. For further information on Web page guidelines, visit: <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">[]

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Three different types of Internet materials that are under the general term, objectionable material are: (1) pornographic materials such as obscene pictures, stories, graphics, articles, cartoons, and videos; (2) racist literature, controversial subjects like gambling, and other such materials; and (3) materials on Web sites that are incorrect and thus inappropriate for K-12 students. It is more difficult to identify Web pages in category 3 than the other two. Teachers have a legal and moral obligation to prevent their students from viewing objectionable materials on the Internet while in the school environment.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Internet Ethics and Objectionable Materials **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Dot Kids is a part of the U.S. domain on the Internet that functions much like the children's section of a public library with content suitable for children under thirteen, implemented in 2002 when the Dot Kids Implementation and Efficiency Act was enacted. For information on Dot Kids: <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">[]
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Dot Kids Implementation and Efficiency Act **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Children’s Internet Protection Act (CIPA) is an Act passed by Congress in 2000 to protect children from obscene, pornographic, and other information on the Internet considered harmful to minors.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Children’s Internet Protection Act **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Many teachers are also parents or plan to be parents. Parents have a number of options to prevent their children from accessing objectionable materials on the Internet. Rating limitations set in Web browser software can be used to restrict access to a Web site. Many browsers use rating levels for material suitable for minors. Filtering software programs allow parents to limit the material available to their children. Some of the more popular programs are Cybersitter (with an intelligent phrase filtering system that screens words in context), Surfwatch (said to be the easiest program to install), Net Nanny (easily customized by parents), and Cyber Patrol (lets parents limit the amount of time spent Web surfing). You can access more information, [|click here].
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Parental Controls **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Schools have in some cases modeled what businesses have done and in other cases have created innovative ways to control their students’ access to inappropriate Web sites. The following sections describe the four-pronged approach that many schools use which includes filtering software, AUPs, curriculum pages, and teacher observation.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Educational Controls **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Filtering software programs are programs that allow parents, teachers, and others to block access to certain materials on the Internet. There are several listed above. One option is to download a 30-day evaluation copy of a filtering software program and then demonstrate it to your students. Most schools have filtering software programs installed on their networks and/or classroom/lab computers as their first line of defense. Teachers need to understand that these programs, while effective, are not foolproof.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Filtering Software **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Acceptable Use Policies (AUP) are a set of rules that govern the use of school and school district computers, networks, and the Internet by teachers, administrators, staff, and students. An example of an AUP can be found at:[| http://landmark-project.com/aup20/pmwiki.php?n=Main.Examples] There are some common guidelines that are contained in most AUPs listed on page 495 of the textbook. Most schools have established AUPs for students, staff, and teachers.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Acceptable Use Policies **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Curriculum pages were covered in previous units. Curriculum pages come in hundreds of different styles and formats and they can prevent students, especially younger students, from accidentally accessing inappropriate materials on the Internet.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Curriculum Pages **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Teacher observations are vital to preventing students from accessing inappropriate materials on the Internet. Teachers need to realize that they must continuously monitor their students while they are online. Review the ethical issues raised in the various topics listed in Figure 8-34 on page 438 in your textbook.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Teacher Observation **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Topic 7. Emerging Technologies
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Experts estimate that approximately $30 billion was spent on K-12 computers, networks, and other technologies during the time period of 1998 through 2003. Educational technology is transforming many of today's classrooms. The Web and other technologies are crumbling the four walls of traditional classrooms and the two covers of traditional textbooks. Covered in the next few sections are seven areas of educational technology that are seen as potentially dramatically changing the way teachers teach and students learn.

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">The textbook and online resources have provided a great deal of information about the “Digital Media Revolution” that is taking place.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Digital Media Revolution **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">A [|QR code] is a two-dimensional code designed to be read by an electronic scanner. You can think of it as a descendant of one-dimensional bar codes such as the Universal Product Code (UPC). But because it contains information in two dimensions (horizontal and vertical) rather than just one, it can carry much more information than a standard bar code of similar size. <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;"> <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">QR Codes **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">The Web has experienced incredible growth and usage in K-12 schools in an extremely short period of time. Internet improvements that will impact Internet usage in K-12 schools are listed in the textbook on page 500. Some of the improvements mentioned are: the speed of the Internet will increase dramatically, streaming video access, iPods, virtual reality tours, interactive websites, handhelds etc.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">The World Wide Web **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">The term "Web 2.0" is commonly associated with web applications which facilitate interactive information sharing, interoperability, user-centered design[1] and collaboration on the World Wide Web. Examples of Web 2.0 include web-based communities, hosted services, web applications, social-networking sites, video-sharing sites, wikis, blogs, mashups and folksonomies. A Web 2.0 site allows its users to interact with other users or to change website content, in contrast to non-interactive websites where users are limited to the passive viewing of information that is provided to them. Wikipedia
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Web 2.0[[image:web20.jpg align="right" link="file:web20.pdf"]] **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Educational software on CD-ROMs has impacted education during the past few years. DVD-ROMs with their huge storage capacity will have an even greater impact on K-12 education.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Educational Software on DVD **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Current and emerging innovative technologies will modify or adapt the classroom for special learning needs. Assistive technologies can aid in teaching students who are visually or hearing impaired, have Down’s syndrome or cerebral palsy, or other needs that make learning challenging. Current and emerging assistive technologies will provide teachers with new and innovative tools to help students with special needs to overcome the disability that blocks or impedes their learning process.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Assistive Technologies **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Section 508 of the Rehabilitation Act is the Federal accessibility initiative that requires federal agencies to give employees with disabilities and members of the public access to technology that is comparable to the access available to others. [|WebXACT] is a free site which allows Web authors to check their Web sites to ensure that the Web site meets accessibility guidelines. How can this free software program help identify the W3C’s Web content Accessibilities Guidelines?
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Federal Accessibility Initiative **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Web- and video-enhanced textbooks have the potential to dramatically enhance student learning. To see an example of a Web-enhanced textbook: http://www.scsite.com/tdc5/
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Web- and Video-Enhanced Digital Textbooks **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Many K-12 schools are creating both Web-enhanced and Web-based courses for their students. [|Florida Virtual School (FLVS)] is a leader in developing and providing virtual K-12 education solutions to students throughout the country. If possible, go online to explain how the school works and the safeguards that are utilized. To learn more about a Web-enhanced high-school class: http://serc.carleton.edu/introgeo/assessment/online.html
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Web-Based Distance Learning **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Wireless technology will impact education in that it will allow teachers and students to connect to smart phones, PDAs, notebook computers, iPods, iPads, etc.
 * <span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">A World Without Wires **

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">No Assignment for this Unit
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Review of Action Research Survey & DE Lesson Plan

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Discussions
<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Using the alternative assessment discussion as a background, how do the PSSAs, SATs and other state assessments fit into this evaluation?

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Given the current mood of the state and federal government are the politicians putting too much emphasis on high stakes testing? Have testing procedures moved into the 21st century or are they stagnated in the 20th century? Does the traditional assessment of the PSSA encourage failure? Are we setting our students up to fail if we do not use project and performance based assignments for testing? What does the research say? Please preface your response with cited information.

<span style="font-family: "Times New Roman",Times,serif; font-size: 130%;">Post your response by clicking of the discussion bubble at the top of this page.