Monday, December 19, 2016


What is a 'Meme'? 
A "meme" is a virally-transmitted cultural symbol or social idea. A meme behaves like a flu or a cold virus, traveling from person to person quickly, but transmitting an idea. 
Historically, a meme is a discrete "package of culture" that would travel via word of mouth, usually as a fascinating story, a fable/parable, a joke, or an expression of speech. Today, memes travel much faster than simple speech. As internet email forwards, instant messages, and web page links, memes now travel instantly via the Internet.

We are going to transform PROVERBS or a SAYINGS into Digital ones.
"No por mucho madrugar, amanece más temprano"


The process could be as follows:
  1. Choose saying. 
  2. Adapt it to a safety on the Internet piece of advice. 
  3. Choose a free image rights. In this way you can get them from:
  4. Make the meme. You can use:
  1. Share it on the padlet at the bottom. You will find there some examples. Do not forget your name and course.
I will share them on Instagram, Twitter and Facebook.
Twitter - hashtags: #RedConsejos and #NewtonConsejos.
Facebook - @IESIsaacNewton


To open the padlet in your mobile device:
Hecho con Padlet

Thursday, December 15, 2016

Friday, December 9, 2016

Privacy - Personal information

How can I protect my digital identity?
You can protect your digital identity on the Internet by being alert to scams, employing strong passwords, installing anti-virus and anti-spyware software and keeping it up-to-date and checking your settings in your social networks accounts and your operating system. But, there are still more things you can do.
Think twice!
Hold on a minute. Before you post that image, blog or tweet, consider the content. If it breaks even one of these rules, think really hard about putting it out there!

Send a picture to someone via email/snapchat/instagram that you wouldn’t want your teacher, boss, principal, or grandma to see!
Sure you are sending them to your good friend or significant other. But what happens when that person is no longer your best friend? Or maybe their phone gets nabbed by someone with less morals.

Post personal information that is not readily available 
Think about the last time you had to recover a password online. Was the question: Pet’s name, childhood street, kid’s birthday or mother’s maiden name? Make sure that kind of information stays private and don’t use it for the actual passwords.

Announce when you are going away 
Yes, your friends are excited that you only have 3 more days until you leave for Hawaii! But so is the guy that has been staking out your house.

Underestimate what your device or computer already knows about you 
All online content is tagged with metadata which contains anything from the timestamp it was created to the location. You cannot see the metadata when you post but simple free software can pull it for someone else. Be wary of geotagging on mobile devices, which marks where you took the photo.

Forget to set your privacy settings 
Not only should you check your settings at the outset but you should recheck them frequently. Facebook, for example, uses an ‘opt out’ policy which means that by default you are sharing more information until you go in and update those settings. Follow us on Twitter or Facebook or join our mailing list to get those updates sent to you.

Post negative comments about your highschool/workplace or classmates/teachers/coworkers
Even if your teacher, boss, classmate or coworkers are not able to see your comment, a future employer could see that comment and reconsider hiring you later. Even with privacy settings set, you are at the mercy of our online friends not to share.

Post photos of your friends that break the first rule
It is a great photo of you. So what if your friend is doing something in the background that would tarnish their reputation? If you tag them, your friend can remove the tag, but unless the photo violates terms and conditions (allowing a site to pull it down) only you control the permissions on that photo. Put yourself in their shoes (and hope they would do the same). This goes double for pictures of underage kids. If the child is under 18, you technically need the parents permission to post it.

Use the same password for every account
I know it is a pain to remember different passwords for all of your sites but it is an even bigger pain if someone hacks in to one of your accounts. Are you using the same password for your social networks, banking, or online shopping? If a hacker finds just one instance of your password then they will now have access to everything.
Binary tatoo tips. Adapteded

Link to infographic

Thursday, December 1, 2016

Digital Identity - Digital footprint - Digital reputation

After these tasks...
How are you defining YOUR digital identity?

Our digital identity, or tattoo, is the permanent collection of data about us that is available online. Each time we post a picture, a blog, a status or a tweet, we are adding to that digital identity. As more online applications become part of our daily lives, our digital identities become increasingly more detailed. There are over a billion pieces of content added to Facebook every day!

But it is not only what you do but what others do!

Sharing every detail of your lives online is a great potential risk. 

What does our digital identity say about us? Who is reading this information? Who is storing this information? What are they doing with it? What impact will it have on our future? What does it say to future employers? The Dean of Admissions? Our descendants? Your insurance company?

To know more:

Saturday, November 19, 2016

Digital Identity - Social Networks and Google

What do others see about you on social networks?
To be sure that you are viewing your public profile, log out of your social networks before (Facebook, for example), or go to a new browser, and you will see exactly the same as a stranger will in them.

What does Google know about me?
Now, logged in your Google account, write "¿Qué sabe Google sobre mí?

Go to the link highlighted and check the results from the 6 links you are provided. Surprised?

Let's control what Google shows about us
Go to Check and edit. Protect your personal information!


Así utilizan tus datos Facebook, Google, Apple y Microsoft. News

What can I find about myself?
  1. What have you discovered about you on your public profiles on your social networks?
  2. What have you discovered about you on Google?
Add a comment on this post (remember: as "Name S" and share what you have found about you)

Digital Identity - Investigation

Let's investigate about our digital identity!

What can I find about my classmates? What can I find about me?
We are going to investigate about your classmates.
  1. Google Search. Write exactly a full name. Use the quotes. I mean, write into the Google search box "Federico Garcia Lorca" and "García Lorca, Federico". You will see how you find results about your classmates, or at least, about people with the same name. 
  2. Add a comment on this post (remember as "Name S" and share what you have found about your or about your classmates (please do not mention your classmates names).

Wednesday, November 2, 2016


In Spanish

What is an Avatar?
In computing, an avatar is the graphical representation of the user or the user's alter ego or character. It may take either a three-dimensional form, as in games or virtual worlds, or a two-dimensional form as an icon in Internet forums and other online communities.

Your avatar is the small picture that appears along with your user-name when you participate in activity on the site. The avatar is also seen above your user-name on your profile page. Many people use a flattering picture of themselves as their avatar, but you can use any picture you want as long as it isn’t offensive. An avatar gives other users a “face” to go with your user-name. They will recognize your avatar when you participate in activity on the site like commenting on articles, posting in the forum, and making new friends.

Some ideas to create your own avatar:
Bloque de Lego
Some usuful tools you may need:
  • Recortes. If you have no option to download your avar, take a screenshot. "Recortes" es a tool you will find only in Windows. Choose a rectagular shape, select your avatar and save it.
  • My Pictr: This is not to create and avatar, but it could be very useful if you want to chage the size of your avatar.
  • A different way of taking a screenshot: CAPTURA DE PANTALLA 



Global Scholars | Global Cities › Program Plans

Traducir esta página

Students login Introduce your username and password:

Go to our classroom, from now on: Valley or Oasis:

Notice who we are going to work with!!!! 

Go to unit 1 > Discussion: Say Hello!

Next, Download the Unit 2 Workbook.

Saturday, October 22, 2016

Signs -Symbols

There are four types of signs:

Mandatory signs:
Tell you to use the correct type of protection to avoid accidents. This protection is obligatory. >BLUE CIRCLES

Danger (hazard):
Warn of possible dangers when you use certain materials or tools. >YELLOW TRIANGLES

First aid and Emergency:
Help and give information about first aid and equipment and emergency exits. > IN GREEN and IN RED FOR FIRE

Forbid certain activities that put your health and others' health at risk. >RED CIRCLES WITH A LINE THROUGH THE PICTURE

Friday, October 21, 2016

Health and Safety rules

(Specific ones will be provided before using each tool and machine).

  1. NO "horseplay" or "fooling around" is permitted. Do not run in the workshop, you could ‘bump’ into another pupil and cause an accident.
  2. Bags should not be brought into the workshop are as people can trip over them so, leave them in the table area.
  3. Avoid Distractions. Distractions are a part of everyday life. When you are distracted while in the middle of performing an action with a power tool, remember to always finish the cut or the solder to a safe conclusion before dealing with the distraction. Taking your attention away from the working tool is a recipe for disaster.
  4. Too much noise makes people irritable and aggressive and interrupts concentration. Try to work quietly.
  1. Always wear safety equipment and wear appropiate clothing. Safety goggles, gloves etc., should be worn due to hazards that may be encountered while using tools.
  2. Long hair must be tied back when working in the workshop.
  3. Don't wear necklaces, rings or loose-fitting clothes - they may get caught in the machines.
  4. Keep your hands clean and dry.
  1. Tools can be dangerous. Never play with them. The greatest hazards posed by hand tools result from misuse and improper maintenance.
  2. Find out how to use each type of tool, equipment and machine correctly before you start. Don't work with tools, equipment or materials you don't know how to use.
  3. Use the right tools for the right task.
  4. Make sure tools are in perfect condition before you use them (check they aren't broken, the handles are secure and that safety elements are in place).
  5. Keep hands away from moving/rotating machinery.
  6. Use hand tools carefully, keeping both hands behind the cutting edge.
  7. Put your tools away while you are not using them.
  8. Clean all equipment and return it to the storage area before leaving the workshop area. 
Obey signs. There are four types of signs:
  • Mandatory
  • Danger (hazard)
  • First aid and emergency
  • Prohibition
  1. Always listen carefully to the teachers (Rosa and Kostyn) and follow instructions. When learning how to use a machine, listen very carefully to all the instructions given by the teachers. Ask questions, especially if you do not fully understand.
  2. While working, ask the teacher again if you have any doubts.
  3. Always be patient, never rush in the workshop.
  4. Report any accident or injury to the teacher immediately (cuts, dust in your eyes, burns...).

More information:
Hand and Power tools.

Exams - Technological Processes

ENGLISH - Exam on Quizlet

ESPAÑOL - Examen en Quizlet

Sunday, October 2, 2016

Technological project

The technological project

Definition of a technological project: 
The different activities carried out since one problem arises until we are able to solve it. 

This method of work consists of the following steps:
  1. NEED
    Define the problem
    : the situation that need to be solved is clearly defined.
  2. IDEA
    Look for solutions
    : searching for information, analyzing similar objects, raising different solutions and choosing the most appropriate one.
    Design the object
    : in this step the idea is set and it is described in written and graphic form.
    : it has to do with anticipating the jobs that are going to be carried out, handing out the job, obtaining the materials and preparing the tools.
    : it is necessary to manufacture the different parts separately and later put them together.
  6. CHECK
    : one tests how the object works and corrects the design if necessary.
    Communication of results
    : it is necessary to present a technical report in which one describes the whole process.

Wednesday, September 28, 2016

Technologies make your life easier

What is Technology?  Where is Technology?  Can we live without it?
Do you want the answer? Easy.

Turn off the electricity and water supply, disconnect the telephone and throw away your mobile phone!!. Wait just for 15 minutes.

How do you feel?
Answer this question in a comment in this article. Don't forget your course and name and the inicial of your surname.
This challenge should be done on Monday October 3rd. If you have problems with your computer or the Internet, do it in your notebook.
Homer Simpson doing the challenge... after 2 minutes