When I talk at PCC the Intro to Computers course we touched on email and with many of my students having just graduated high school the following 14 Email Etiquette rules is still timely and perhaps should be shared with your students even if they are graduate students! Have something to add? Leave a comment! 14 Email Etiquette rules handout
- Include a clear, direct subject line.
- Use a professional email address.
- Think twice before hitting ‘reply all.’
- Use professional salutations.
- Use exclamation points sparingly.
- Be cautious with humor.
- Know that people from different cultures speak and write differently.
- Reply to your emails — even if the email wasn’t intended for you.
- Proofread every message.
- Add the email address last
- Double-check that you’ve selected the correct recipient.
- Keep your fonts classic.
- Keep tabs on your tone.
- Nothing is confidential — so write accordingly.
Check out this video about creating PowerPoint slides at least the first few minutes! Fast forward to 22 minutes, this is really worth the time! And some good ideas too and not just for lecture capture!
Click here to view the video!
This is a question I get asked frequently how can I use Presenter View in PowerPoint to read my notes in the classroom. It’s easy if you bring your Mac just connect with the Ring of Power connectors and use presenter view. But it doesn’t work that way if you are using the classroom desktop, as the screen is not considered a 2nd monitor!
Here’s a tip that may work for those who have IPads. Try Microsoft Office across Devices.
Want to see how it works? Contact OET!
And read about DatAnywhere?
DatAnywhere is a file storage solution that works like Dropbox or Google Drive, except DatAnywhere allows you to:
- Create a secure private cloud experience using your existing file-sharing infrastructure.
- Keep your data on ECU file servers.
- Keep your existing permissions (e.g. NTFS and Active Directory). (Only people who already have access to the files get access via DatAnywhere.)
- Easily recover accidentally deleted or renamed files housed on Piratedrive. (Remember…DatAnywhere data is Piratedrive data.)
- Provide secure, enterprise-capable file synchronization and mobile device access.
- Set expiration dates on secure shared links.
- Access secure shared links via PIN verification.
- Disable and remotely wipe devices.
More information and instructional material:http://www.ecu.edu/itcs/networkstorage/datanywhere.cfm
An interesting article on using blogs and other social media in the classroom and getting students connected with not only their fellow classmates but other disciplines as well. To quote from the article (click the title to read the entire article)
“The technology will not only help students to make connections about what they’re learning, but will also function as an e-portfolio, documenting their work. In turn, administrators hope this will lead to an institution-wide cultural change, as students do more of their work on public platforms, work collaboratively with each other and respond to each other’s work online and with digital tools.”
I know some of you are using blogs why not share your experiences with us!
Try Lynda.com as a resource
Recently from ITCS
- First, make up a sentence you can remember. For example: My dog, Sylvia, has a birthday January 14.
- Next, take the first letter of each word and…
- Make 1-2 letters upper case
- Make at least one letter a number
- Make at least one letter a special character such as, ! @ # $ % ^ & * ( ) = +
- The new passphrase: Md$habJ1 (don’t use this one!).
Hacker programs crack your passphrase by trying every word in the dictionary and other tricks. Here are a few things to avoid:
- Never use personal information to create a passphrase.
- Never use the word, password, as your passphrase. This includes using numbers or special characters to make the word look different.
- Never use easily-obtained, personal information such as license plate numbers, telephone numbers, etc., as part of your passphrase.
- Never use any word contained in a dictionary, spelling list or other word list in any language.
- Never use transformations such as reversing the spelling, changing upper case to lower case or using all caps.
- Never select a passphrase that is common to everyone (Go@Pirates!).
For more information on passphrase security, please visit www.ecu.edu/itcs/ithelpdesk/passphrase.cfm.
So how can you control the computer without your mouse? Well firstly, the easiest thing to do is use the ALT key and the ATL + TAB key combo. ALT + TAB lets you switch between programs and just pressing the ALT key on your keyboard focuses onto the menu options, such as File, Edit, etc.
The right-click keyboard shortcut is to hold down SHIFT and then press F10. That’s one of my favorite keyboard shortcuts because it comes in VERY handy and sometimes it’s actually easier to use the keyboard than the mouse.
There are some other handy Windows keyboard shortcuts that you should know in case you are stuck in a bad situation:
CTRL+ESC: Opens the Start menu (then use ARROW keys to select an item)
ALT+DOWN ARROW: Opens a drop-down list box
ALT+F4: Closes the current program window
ALT+ENTER: Open the properties for the selected object
So much going on so many emails. I even missed sending last week’s blog so will do double duty today!
First here is a neat slide show on Disruptive Technologies 2015-2106 will give you something to think about.
Now if you have missed the recent posts from ECU Learning Technologies Digest let me just highlight some of the postings!
Classroom Selection for Summer and Fall 2015: New Options
As you consider your future classroom technology needs, here is a description of some of the equipment you will find in the classrooms across campus. New options include AirMedia, which allows you to present wirelessly from any device, Desktop Recording with MDR or Tegrity, and Video Conference using Saba or Jabber. Visit the Classroom Technology Database for even more options and to see the complete list of equipment offerings per room.