Experience the Oregon Trail

What was life really like in the plains and on the Oregon Trail? This section of the PPT explores some of the real challenges and hardships faced by American pioneers as they journeyed westward. It will use the Oregon Trail game as an example, reference, and model to help better understand the Oregon Trail in a fun and educational way.

The Oregon Trail game is perhaps the most famous educational computer software game ever created. Even today, references to the game can be found throughout popular culture.

Learn more about the game, explore the lead designer’s website, or play the original game (multiple versions) online.

Oregon Trail Game Landmarks

The following 18 landmarks were included in the original version of the Oregon Trail game. These are not the only major landmarks on the historic Oregon Trail (notice the infamous Platte River is missing), but they are a good starting point to learn about the realities of life on the trail. Therefore, the same landmarks are included in the Oregon Trail PPT game that’s available at the end of this presentation.

  1. Independence, Missouri (starting point)
  2. Kansas River (102 mi)
  3. Big Blue River (82 mi)
  4. Fort Kearney (118 mi)
  5. Chimney Rock (250 mi)
  6. Fort Laramie (86 mi)
  7. Independence Rock (190)
  8. South Pass (102 mi)
  9. a) Green River (57 mi) (leads to Soda Springs)
  10. b) Fort Bridger (125 mi) (leads to Soda Springs)
  11. Soda Springs (143, 162 mi)
  12. Fort Hall (57 mi)
  13. Snake River (182 mi)
  14. Fort Boise (113 mi)
  15. Blue Mountains (160 mi)
  16. a) Ft. Walla Walla (55 mi) (detour before The Dalles)
  17. The Dalles (125 mi, 120 mi)
    1. Columbia River (5 + 95 mi)
    2. Barlow Road (100 mi)
  18. Willamette Valley, OR!! (final destination)

Independence, Missouri (starting point)

Kansas River (102 mi)

Big Blue River (82 mi)

Fort Kearney (118 mi)

Chimney Rock (250 mi)

Fort Laramie (86 mi)

Independence Rock (190)

South Pass (102 mi)

a) Green River (57 mi) (leads to Soda Springs)

b) Fort Bridger (125 mi) (leads to Soda Springs)

Soda Springs (143, 162 mi)

Fort Hall (57 mi)

Snake River (182 mi)

Fort Boise (113 mi)

Blue Mountains (160 mi)

a) Ft. Walla Walla (55 mi) (detour before The Dalles)

The Dalles (125 mi, 120 mi)

Columbia River (5 + 95 mi)

Barlow Road (100 mi)

Willamette Valley, OR!! (final destination)

Play the Oregon Trail Game

Top 10 Rivalries of the American Old West

The American Old West is probably most well known for stories of “cowboys vs. Indians” or “outlaws vs. lawmen.” While many stories are true, much of what we think of when we think of the Old West has been sensationalized to the point of legend. This section will include cowboys, Indians, outlaws, and lawmen, but will focus more on the biggest rivalries during that period than on individuals.

This section of the the presentation will cover the following ten Old West rivalries:

  1. Hamilton vs. Burr (1804)
  2. North vs. South (1861-1865)
  3. Cowboys vs. Indians (1883-1913)
  4. US Army vs. Indians (1775-1924)
  5. Man vs. Wild (1836-1869)
  6. Outlaws vs. Lawmen (1865-1890)
  7. Government vs. Big Business (Trust-busting) (1900-1917)
  8. Hatfields vs. McCoys (& other famous feuds) (1863-1891)
  9. Blacks vs. Whites (the title is an obvious over-simplification) (1526-??)
  10. Mormons vs. Anti-Mormons (1823-1847)

1. Hamilton vs. Burr (1804)

2. North vs. South (1861-1865)

3. Cowboys vs. Indians (1883-1913)

4. US Army vs. Indians (1775-1924)

5. Man vs. Wild (1836-1869)

6. Outlaws vs. Lawmen (1865-1890)

7. Government vs. Big Business (1900-1917)

8. Hatfields vs. McCoys (1863-1891)

9. Blacks vs. Whites (1526-??)

10. Mormons vs. Anti-Mormons (1823-1847)

Historic American Old West

This section of the PPT focuses on the historic Old West. It is broken into three major sections and a total of eight subsections. Each subsection includes between five to eight major events that defined the era. It covers nearly 50 total events.

My goal here is to just give a brief overview of the events, and how one thing led to another. For more details about each event, click the links within to explore Wikipedia or other resources.

The Historic American Old West can be broken down into three major sections:

  1. Westward Expansion (1789-1849)
  2. American Civil War (1849-1865)
  3. Industrialization (1865-1918)

Westward Expansion (1789-1849)

There are four major sections in the period of westward expansion:

  1. Federalist Era (1788-1801)
  2. Jeffersonian Era (1801-1817)
  3. Era of “Good Feelings” (1817-1825)
  4. Jacksonian Era (1825-1849)

Federalist Era (1788-1801)

Six key events during the Federalist Era:

  1. U.S. Constitution
  2. Alien & Sedition Acts
  3. Bill of Rights
  4. Jay Treaty with Great Britain
  5. The XYZ Affair
  6. Quasi-War with France

U.S. Constitution (1788)

Hamilton wrote extensively in support of ratification of the U.S. Constitution. He wrote 51 of 85 of The Federalist Papers that argued for ratification.

The U.S. constitution consisted of 7 articles and establishes a strong federal government (which Hamilton was in favor of).

  • Articles 1-3: Detail the separation of powers of the U.S. government
  • Articles 4-6: Lay out the rights of state governments
  • Article 7: Gives the procedure for ratification

U.S. Bill of Rights (1791)

Consisting of 10 Amendments to the Constitution that were written to address objections raised by non-Federalists regarding the powers of the federal government laid out in the Constitution.

James Madison studied the deficiencies pointed out by non-Federalists and crafted articles of amendment that he wanted to be included within the Constitution itself. Congress approved twelve articles, and the States ratified 10 of these, but they were kept separate from the Constitution as the Bill of Rights.

  1. Freedom of Speech, Press, Religion, Petition, & Assembly
  2. Right to Bear Arms
  3. Quartering of Soldiers
  4. Search & Seizure
  5. Rights of the Accused
  6. Requirements for a Jury Trial
  7. Rules of Common Law
  8. Limits on Criminal Punishment
  9. Rights Kept by the People
  10. Powers of the States & People

Jay Treaty with Great Britain (1794)

The Jay Treaty resolved ongoing issues between the U.S. and Great Britain after the 1783 Treaty of Paris (which officially ended the Revolutionary War and established boundaries between the U.S. and Great Britain in North America).

The Jay Treaty is named for John Jay, who was the main negotiator, although is was designed by Hamilton and supported by Washington. It facilitated 10 years of peaceful trade between the two in the midst of the French Revolutionary Wars that began in 1792.

The Treaty angered France and bitterly divided the U.S. into two parties: the pro-British, pro-Treaty Federalists (Hamilton) vs. the pro-France, anti-Treaty Jeffersonian Republicans (Jefferson).

The XYZ Affair (1797-1798)

France, angered by the Jay Treaty, and the U.S. declaration of neutrality from the war in Europe (1792), stepped up efforts to disrupt trade with Britain. In 1797, an American diplomatic commission was sent to France to try to negotiate a solution to these problems that might lead to war.

The diplomats were approached through informal channels by French diplomats Jean-Conrad Hottinguer, Pierre Bellamy, and Lucian Hauteval (later referred to as diplomats “X”, “Y”, and “Z” in documents released by the Adams administration) who demanded bribes and a loan for French foreign minister Talleyrand before negotiations would begin.

The affair outraged the U.S. and led directly to the undeclared Quasi-War. Federalists were in control of both houses of Congress and the presidency, and took advantage of the outrage to build up the nation’s military. They also attacked the Jeffersonian Republicans for their continued pro-French stance.

Jeffersonians are more Frenchman than American.

Hamilton

Jefferson would counter that Federalists are more British, and focused on building a monarchy, than a true democratic republic (i.e. they are more anti-American than we are).

Quasi-War with France (1798-1800)

In 1793, Congress had suspended repayments of French loans incurred during the Revolutionary War. This, along with the Jay Treaty that France viewed as contrary to their own treaties with the U.S. led France to begin capturing American ships at sea that were trading with Britain.

By October 1797, over 316 American ships had been captured. And when diplomatic negotiations failed due to the XYZ Affair, Federalists used it as an opportunity to build up the American navy for a war against France.

Alien & Sedition Acts (1798)

After ratifying the U.S. Constitution, the Federalist-dominated Congress (Hamilton’s party) passed a series of 4 Acts, known as the Alien & Sedition Acts. The Federalists argued these would strengthen national security during the Quasi-War with France. Critics argued they were an attempt to suppress non-Federalist votes and violated the freedom of speech in the First Amendment of the Constitution.

  1. Naturalization Act: harder for an immigrant to become a citizen
  2. Alien Friends Act: allowed the President to imprison and deport non-citizens who were considered dangerous
  3. Alien Enemies Act: imprison and deport non-citizens from a hostile nation (such as France)
  4. Sedition Act: criminalized making “false statements” critical to the national government

Jeffersonian Era (1801-1817)

Seven key events during the Jeffersonian Era:

  1. Election of 1800
  2. Louisiana Purchase
  3. Lewis & Clark Expedition
  4. American Fur Company
  5. Mexican Independence Declared
  6. War of 1812
  7. South Pass, WY discovered

Election of 1800

Actually, before the Louisiana Purchase of 1803, America faced a constitutional crisis and nearly a revolution (thus, this election is sometimes referred to as the “Revolution of 1800”). For a full explanation, this post on Vox contains some great detail.

Long story short, at that time, in presidential elections, the first place person would become President and the second place person would be Vice President. But no one had considered what would happen when one party put forth BOTH a Presidential choice and a Vice Presidential choice at the same time.

The Republicans had put forth Thomas Jefferson as Presidential candidate and Aaron Burr as Vice Presidential candidate. But, they both received 73 votes which meant “technically” there was a tie between them.

The opportunistic Burr realized that the Federalists feared Jefferson and might actually hand him the presidency in a tie-breaker. But Hamilton managed to eventually sway Federalist opinion away from Burr. So even though he had fiercely opposed Jefferson previously, now he helped him get elected to President (since his own Federalist party lost the election). But this is not the event that led to their duel.

In 1804, he was dropped from the Presidential ticket with Jefferson because of his behavior in 1800 (and actually, he was frozen out of any influence in the 1800 Jeffersonian administration as well). He then attempted to revive his political career by (unsuccessfully) becoming governor of New York. Burr heard reports that Hamilton had privately slandered him before the election, and that was the last straw. The duel was on. This whole story sure gives a new level of depth to their rivalry.

I feel it is a religious duty to oppose his career.

Hamilton

I would have shot him in the heart if my vision had not been impaired by the morning mist.

Burr

And yet, that is not the end of Burr’s story. He later attempted to treasonously claim and take over parts of America (as President of his own America) that he apparently thought the federal government had less control and power over.

He claimed to have been attempting to increase the size of Jefferson’s U.S. by taking the land from Spain. But Jefferson had him arrested and tried for treason. He was found not guilty by the judge in a controversial decision, but here now is another reason he’s considered a villain in U.S. history.

Louisiana Purchase (1803)

The Louisiana Purchase was a long-term goal of Thomas Jefferson who was able to complete the deal with France in 1803. France had controlled the Louisiana Territory since 1699, ceded it to Spain in 1762, and then regained ownership of it in 1800 through Napoleon.

The U.S. purchased the territory for $15 million, and the acquisition nearly doubled the size of the existing U.S. territory by adding to it approximately 828,000 square miles (2.14 million sq. km) of new land.

However, boundaries were not determined exactly, until:

  1. The Treaty of 1818 with Britain that firmly established the northern boundaries, and
  2. The 1819 Florida Treaty with Spain that firmly established the western boundaries

Lewis & Clark Expedition (1804-6)

Shortly after the acquisition of the Louisiana Territory, Army Captain Meriwether Lewis and Second Lieutenant William Clark formed the Corps of Discovery, a select group of U.S. Army and civilian volunteers, commissioned by President Thomas Jefferson, to explore and map the new territory.

They set out from Camp Dubois in Illinois in May 1804 and spent the next two years in exploration. In the winter of 1804, they built Fort Mandan in North Dakota. In April, when they were about to set out again, tensions rose among the native Mandan people and nearly came to a conflict. It was then that the party met a French-Canadian fur trapper and his Shoshone wife, Sacagawea.

Charles M. Russell (1864-1926); Lewis and Clark on the Lower Columbia; 1905; Opaque and transparent watercolor over graphite underdrawing on paper; Amon Carter Museum of American Art, Fort Worth, Texas; 1961.195

From there, the two stayed with the expedition, serving as guides, cook, and interpreter until nearly the end (August 1806). Sacagawea proved invaluable to the expedition and is remembered widely as perhaps the most important key to its success. Her husband, the trapper, was not remembered so fondly, and Lewis has called him “a man of no particular merit” as well as “perhaps the most timid waterman in the world.”

By the time the expedition returned to St. Louis in September 1806, they had explored over 6,000 miles of new territory, produced 140 maps, encountered 70 Indian tribes, and discovered 200 new species.

American Fur Company (1808)

The AFC was founded in 1808 by German immigrant John Jacob Astor, and by 1830, his company (in multiple locations) had grown to monopolize the fur trade in the U.S., becoming one of the largest and wealthiest businesses at that time.

In 1811, his company established Fort Astoria in Oregon at the mouth of the Columbia River. It was the first American settlement on the Pacific coast. In June, most of the crew of the Tonquin, one of his trading ships , was massacred by the Tla-o-qui-aht Indians after the captain insulted a chief.

The following October, 1812, a group of his company discovered South Pass, WY (see below) as a viable passage across the Continental Divide, when they returned east to tell of the fate of the Tonquin.

Mexican Independence Declared (1810)

In September 1808, peninsular-born Spaniards in New Spain (Mexico) overthrew the Viceroy. In 1810, American-born Spaniards began plotting an uprising against Spanish rule, and on September 16, the Catholic priest of the village of Dolores rang his church bell, giving the call to arms for the beginning of the revolution.

By 1821, the war for independence concluded with the Treaty of Cordoba. Also in 1821, Spain’s Florida Treaty with America took effect – two years after its initial signing. Both events weakened Spain’s hold on lands in North America and paved the way for further American influence and expansion.

South Pass, WY discovered (1812)

South Pass was discovered in October 1812 by a group of 7 men from the Pacific Fur Company (a subsidiary of John Jacob Astor’s American Fur company (see above)). They were returning to tell of the massacre of the crew of one of their trading ships.

South Pass would later by used by more than half a million westward migrants as part of the main route of the Oregon Trail, among others. It was the key, primary passageway for wagons bound for the Pacific, and its discovery proved invaluable for America’s early westward expansion.

War of 1812 (1812-14)

The War of 1812 was the only war in U.S. history in which the U.S. Capitol was burned, and the only war fought between the U.S. and Canada.

In fact, at that time, northeastern Canada was under British rule. Canada did not become a truly independent nation until 1982, when it adopted its own constitution, although they are still a part of the British Commonwealth – which accepts the British monarch as its own.

The war, therefore, was another conflict between Britain and the U.S., this time stemming from different things:

  1. Long-standing territorial disputes
  2. Britain supported Native American tribes who opposed U.S. colonial settlement in the Northwest Territory (surrounding the Great Lakes)
  3. In 1807, the Royal Navy began enforcing tighter restrictions on U.S. trade with France
  4. Britain began impressment of men (forced conscription into their military) on captured U.S. ships – even if they had a document of U.S. citizenship

The conflict primarily arose at sea, and could have been fought primarily at sea (many battles were), but the Royal Navy was far larger and stronger. Therefore, the U.S. decided to invade Canada – to attack Britain on land, where they might have an advantage – and expand U.S. territory into northeastern Canada.

Until 1814, Britain was partially also involved in a war with Napoleon in Europe, so they were less able to put their full might behind defending Canada. But by 1814, the conflict with Napoleon was resolved, and they were able to reinforce their troops in Canada.

The Treaty of Ghent was signed between the two countries in the city of Ghent, United Netherlands on Christmas Eve, 1814, but would not take effect until 1815.

In fact, one of the biggest battles of the War of 1812 was fought in New Orleans after the Treaty was signed. The Battle of New Orleans was the climax of Britain’s five-month Gulf Campaign to capture New Orleans, and possibly the rest of the Louisiana Territory. But under the leadership of Brevet Major General Andrew Jackson, the greatly outnumbered American forces defeated the British assault in just over 30 minutes. The Americans suffered 71 casualties, while the British suffered over 2,000, including the deaths of their first and second-in-command.

The victory was deemed the “Miracle at New Orleans” and made Andrew Jackson a household name and popular culture (pamphlets, songs, editorials, speeches, and plays) glorified his image to heroic and legendary. His popularity led to his election as the 7th President of the U.S. in 1828.


Era of “Good Feelings” (1817-1825)

Five key events during the Era of Good Feelings:

  1. Florida Treaty with Spain
  2. 2nd Great Awakening
  3. Missouri Compromise
  4. Mexican Independence Achieved
  5. “Monroe Doctrine”

The phrase “Era of Good Feelings” was first used by Benjamin Russell in the Columbian Centinel, a Federalist newspaper based in Boston, on July 12, 1817. It followed President James Monroe’s visit to Boston as a part of his good-will tour of the U.S.

The period is marked by downplayed partisan affiliations (particularly on the part of President Monroe), the collapse of the Federalist party, and a collective sense of national pride and purpose – with a desire for national unity – following the War of 1812.

Florida Treaty with Spain (1819, 1821)

2nd Great Awakening (1820)

Missouri Compromise (1820)

Mexican Independence Achieved (1821)

“Monroe Doctrine” (1823)


Jacksonian Era (1825-1849)

Five key events during the Jacksonian Era:

  1. Voting Rights increased
  2. Indian Removal Act
  3. “Manifest Destiny”
  4. Annexation of Texas
  5. Gold Rush!

Voting Rights increased

Indian Removal Act

“Manifest Destiny”

Annexation of Texas

Gold Rush!


American Civil War (1849-1865)

The American Civil War was a major turning point in U.S. History. This period stands on its own in the timeline of the American Old West.

Five major events during the Civil War Era:

  1. Compromise of 1850
  2. “Go West, Young Man”
  3. Pony Express
  4. Confederacy Founded
  5. Homestead Act

Compromise of 1850

“Go West, Young Man”

Pony Express

Confederacy Founded

Homestead Act


Industrialization (1865-1918)

There are three major sections in the period of industrialization:

  1. Reconstruction Era (1865-1877)
  2. Gilded Age (1877-1895)
  3. Progressive Era (1896-1916)

Reconstruction Era (1865-1877)

Eight major events during the Reconstruction Era:

  1. Lincoln Assassinated
  2. 13th Amendment
  3. Rise of the Ku Klux Klan
  4. Alaska Purchase
  5. 14th Amendment
  6. First Transcontinental Railroad completed
  7. 15th Amendment
  8. Jim Crow Laws
  9. Civil Rights Act

Lincoln Assassinated

13th Amendment

Rise of the Ku Klux Klan

Alaska Purchase

14th Amendment

First Transcontinental Railroad completed

15th Amendment

Jim Crow Laws

Civil Rights Act


Gilded Age (1877-1895)

Six major events during the Gilded Age:

  1. Shootout at the O.K. Corral
  2. Chinese Exclusion Act
  3. Northern Pacific & Southern Transcontinental Railroads completed
  4. Indian Wars (ongoing, but now with gusto)
  5. Oklahoma Land Rush
  6. Wounded Knee Massacre

Shootout at the O.K. Corral

Chinese Exclusion Act

Northern Pacific & Southern Transcontinental Railroads completed

Indian Wars

Oklahoma Land Rush

Wounded Knee Massacre


Progressive Era (1896-1916)

Seven major events during the Progressive Era:

  1. Sherman Antitrust Act (enforced)
  2. Panama Canal (completed by US)
  3. “Square Deal” Policy
  4. “The Jungle” & muckraking writing
  5. Ford Model T
  6. Increased Immigration to the US
  7. The Great Migration (from the South)

Sherman Antitrust Act

Panama Canal

“Square Deal” Policy

“The Jungle” & muckraking

Ford Model T

Increased Immigration

The Great Migration

The American Old West (1789-1916)

After nearly two weeks of 6-8 hour days, scouring Wikipedia and other historical websites and blogs, I feel like I’ve retaken my high school American History class, but this time with greater insights into what happened during that period of time.

I was asked to give a presentation on “American Pioneers” for the Teacher Training program I’m involved with. I said, “great, I’m related to some of the Old West pioneers – I could probably talk about that a little.”

But as I got to work building the PPT, I realized there was actually a LOT of stuff that I was only marginally familiar with. And as I dug deeper, I became enthralled with my study of the American Old West – it’s quite fascinating.

Breakdown

This presentation is LONG (200+ slides in total). Although that’s partially due to splitting US map gifs depicting the growth of the nation into multiple slides, I think the full PPT and contents contained within are of such a length as to warrant multiple blog posts. Therefore, the full presentation will be broken down in this way:

  1. Brief introduction (this section)
  2. Historical Old West
  3. Sensational Old West (Top Ten Rivalries)
  4. Real Old West (Oregon Trail PPT Game)

Continue reading below for a description of each concurrent section.

Brief introduction

This presentation begins almost where my Hamilton presentation ends. (But it includes some important events that took place during the Federalist Era while Hamilton was still alive, such as the U.S. Constitution and Bill of Rights.)

Hamilton was shot and killed in 1804 in a duel with then Vice President Aaron Burr. The Louisiana Purchase was made in 1803, which began the period of westward expansion in the US.

Historical Old West

The period of the American Old West can be broken down into three major sections:

  1. Westward Expansion (1789-1849)
  2. American Civil War (1849-1865)
  3. Industrialization (1865-1918)

Sensational Old West (Top Ten Rivalries)

The American Old West is probably most well known for stories of “cowboys vs. Indians” or “outlaws vs. lawmen.” While many stories are true, much of what we think of when we think of the Old West has been sensationalized to the point of legend.

This section will include cowboys, Indians, outlaws, and lawmen, but will focus more on the biggest rivalries during that period than on individuals. I’ve selected the following ten rivalries to focus on:

  1. Hamilton vs. Burr (1804)
  2. North vs. South (1861-1865)
  3. Cowboys vs. Indians (1883-1913)
  4. US Army vs. Indians (1775-1924)
  5. Man vs. Wild (1836-1869)
  6. Outlaws vs. Lawmen (1865-1890)
  7. Government vs. Big Business (Trust-busting) (1900-1917)
  8. Hatfields vs. McCoys (& other famous feuds) (1863-1891)
  9. Blacks vs. Whites (the title is an obvious over-simplification) (1526-??)
  10. Mormons vs. Anti-Mormons (1823-1847)

Real Old West (Oregon Trail PPT Game)

The Oregon Trail is probably the best known example of American westward expansion and “manifest destiny.” It was largely popularized for a generation of students in the 1970s and 80s on the Apple II computer, and other devices, in the form of a computer game developed by MECC.

The Oregon Trail game is a classic (I grew up with it as well), and arguably the top educational game of all time. It introduced players to the harsh realities of the Oregon Trail in a fun and educational way. Therefore, this section of the PPT partially attempts to recreate the experience of the computer game as a PPT game that can be played in a classroom. It is divided into two sections:

  1. Exploring the Oregon Trail computer game + landmarks
  2. Oregon Trail PPT game

Teacher Training Tech Tips

This presentation was for the Teacher Training program at Jeonju University. With this presentation, I coupled together (and updated) a few of my most well-used presentations for the program, including a PPT on Internet Security, the previous Teacher Tech Tips, and an overview of some of the technology options we had for things to study in the course.

Teacher Tech Tips Update

This talk is an updated version of a similar talk I gave in 2017. It combines that talk with another presentation I’ve given to my high school classes on Internet Security and Safety, as well as introduces possible app options to learn during this Teacher Training course.

There are THREE main topics to discuss in this presentation:

  1. Computer Security
  2. Professional Productivity
  3. Technology Learning options

Part ONE: Computer Security

The first section of this presentation will focus on THREE aspects of Security both on and offline:

  1. Phishing
  2. Hacking
  3. Social Engineering

Phishing

What is Phishing?

Phishing is a type of social engineering where an attacker sends a fraudulent (“spoofed”) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim’s infrastructure like ransomware.
– Wikipedia

In other words: Phishing is a false email or message you receive that purposefully attempts to get you to compromise your security in some way.

Questions to Consider:

  • Do you know someone who has been scammed? What happened?
  • What is the purpose of a scam? What are some tricks people use?
  • What kinds of personal information might someone try to get? How do they get it?

Commonalities in Phishing Messages:

  • They want you to verify your account information (online)
  • Because they alert you that “your account is in trouble!”
  • And there’s a sense of urgency
  • You can find English spelling or grammar errors (very common)
  • There’s often a link provided (which can be disguised)
  • Or some kind of attachment (also disguised, potentially hiding a virus)
  • Or the message sounds too good to be true (“You’ve won $1 million!”)
  • And often there is a generic greeting (“Dear Sir / Madam”)

The PPT gives THREE examples of phishing emails. Can you notice what is “off” about each one? What clues give away their phishing intention?

Hacking

What is Hacking?

Hacking refers to activities that seek to compromise (by breaching defenses, or exploiting weaknesses in) digital devices, such as computers, smartphones, tablets, and even entire networks.
– MalwareBytes

Can you read the following message? It’s written in Leet:

K33P C4LM 4ND 5P34K L337

In English, it reads: “Keep Calm and Speak Leet.”

Leet is basically a kind of modified spelling of English words that replaces some characters with numbers or symbols that look similar to the English letters they are replacing.

It’s also a GREAT way to stay safe on the Internet. By using a password or passphrase that includes symbols or numbers in place of similar-looking letters, you can create a password that is relatively easy to remember but hard to hack.

Password Tips

  • NO
    • Dictionary words or very common words (nor combinations of 2 or 3)
    • Not short – shorter = weaker and easier to hack
    • Not easy to guess information like your birthday, or your mother’s name, or any information that can be easily found on your Facebook profile
  • YES
    • $ymbol$, L337$p3@k (Leetspeak), etc
    • Longer = stronger
    • Sometimes patterns are helpful – for example, on social media, create a passphrase that reminds you of your purpose on each platform:
      • onFacebookIpostpics4family
    • A passphrase is much stronger than a password
      • For example: mymothertoldmetoalwaysbecareful even though it doesn’t use any special characters, numbers, nor Capitals, is MUCH stronger than 5@f3tY!1st (safety!1st) and much easier to remember

Stay Safe

Passphrases beat Passwords

The image below is a cartoon from XKCD.com that illustrates why passphrases almost always beat passwords:

Passphrases change lives

Want to read a great story about how a password changed someone’s life?

Single Sign-on vs. Traditional Login

Now, while we’re on the subject of passwords, let’s also talk about the difference between Single Sign-on methods (logging in with Facebook or Google, etc) and the traditional email/password login method.

These ARE NOT the same, so please don’t be confused.

In a basic sense:

  • Single Sign-on
    • Facebook or Google, etc manages your private data, user profile information, and so on
    • When you click the SSO button, you sign in to THAT site
    • Then THAT site provides THIS site with a special TOKEN proving you are you
    • Then you get access to THIS site
  • Traditional Login
    • THIS site records your email and password and stores it in its own database
    • THIS site manages your user profile information
    • When you click the login button, THIS site checks your email / password combination against its database to verify your identity
    • If your email / password combination is correct, you get access to THIS site

In sum:

  • Single Sign-on is managed by Facebook, Google etc, and retains NO email / password information for you in THIS site – you are logged in with a TOKEN
  • Traditional Login is managed entirely by THIS site, and THIS site retains your email / password data, which is used to log you in. There is NO connection to Facebook, Google, etc using the Traditional Login – it only remembers your email (but is NOT connected to it)
Pros & Cons

Personally, I prefer SSO logins to Traditional logins for a number of reasons:

  1. It’s easy and streamlined
  2. I don’t have to create ANOTHER account and remember ANOTHER password
  3. It already links to my verified profiles on social media
  4. With updated accurate info and profile pictures
  5. I can link other accounts to the service or site as well
  6. There are less failed logins
  7. Less abandonment of the site
  8. And greater user adoption

There are a few disadvantages we can talk about as well though:

  1. Security issues
    • If the major website is compromised (hacked), then your information that’s stored on it will also be compromised (but Facebook / Google are huge and have enormous resources – more than THIS site – to combat that)
    • Also, it can promote bad password practices like reusing the same password everywhere for convenience
  2. Privacy
    1. Additionally, by logging in to Facebook / Google on THIS site, you will be allowing these services to track your behavior and display targeted ads here
    2. Also, your social data is essentially completely “open” and accessible to THIS site once you login

But personally, I still find SSO to be far more convenient, and I can deal with the disadvantages it provides.

But remember:

  • If you JOIN the site with SSO
  • You ALWAYS have to login with SSO
  • You can’t use your email / password in the login fields

Social Engineering

What is Social Engineering?

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information.
– Wikipedia

One of the best movies that highlights social engineering is Catch Me If You Can (Amazon affiliate) with Leonardo DiCaprio and Tom Hanks:

The most basic principle to always keep in mind when it comes to Internet, computer, or even building security is:

YOU are always the weakest link

Let’s take a look at some of the most common social engineering methods and tactics below. Click the links for more information:

Stay Safe

Protect yourself from social engineering by keeping the following principles in mind:

  1. Be skeptical (trust no one)
  2. Don’t open suspicious (unexpected) emails (or messages)
  3. Mark suspicious messages as “Spam” or “Junk” (this helps everyone)
  4. Don’t click links in messages (hover over them to double-check the destination, or copy-paste the link in your browser window as links can be disguised)
  5. Check URLs (look for HTTPS (“s” for “secure”) and make sure the URL is real)
  6. Don’t enter your personal information, particularly NOT passwords or credit card information into websites you’ve linked to from outside sources
  7. When in doubt, call customer service to verify the email or message
  8. Create strong passwords (passphrases)
  9. Always remember to install security patches and updates (which fix vulnerabilities that have been exploited)

Back to Top


Part TWO: Professional Productivity

This portion of the presentation was originally given as part of a training seminar at Global Prodigy Academy international high school in Jeonju. Please view the following link for that presentation in its entirety:

The majority of that presentation remains the same in this updated version with the exception of Multiple User Profiles, in both Chrome and Windows, which we’ll look at in more depth after the Useful Computer Tricks section.

Useful Computer Tricks

The following are some of THE very best computer tricks for teachers I’ve picked up over the years (and use on a nearly daily basis):

  1. Browser Tricks
    1. CTRL + SHIFT + N = Chrome’s Incognito mode (doesn’t save passwords, browsing history, etc)
    2. CTRL + SHIFT + T = Re-open the most recently closed tab
    3. In Gmail, with keyboard shortcuts enabled: C = compose new message
    4. Also in Gmail, type SHIFT + ? to view a pop-up of ALL of Gmail’s keyboard shortcuts
    5. And in Google Docs, a quick way to Strikethrough anything you don’t want is to highlight it and press ALT + SHIFT + 5
    6. We’ll talk about Multiple Chrome users in the next section
  2. Windows Shortcuts
    1. CTRL + ALT + DELETE = Slow, additional step to Task Manager
    2. CTRL + SHIFT + ESC = FAST, direct Task Manager access
    3. Win + ← or Win + → = Move current window to half screen
    4. Win + L = Instant logout
    5. Win + P = Change Presentation (projector) mode
    6. PrtSc = screenshot & screen drawing (with the Lightshot app installed)
  3. Text Editing
    1. CTRL + V = pastes text into a Document
    2. But CTRL + SHIFT + V removes styling from the text you copy-paste
    3. CTRL + K = create hyperlink from selected text
    4. CTRL + Z = undo
    5. But CTRL + SHIFT + Z = redo

Multiple Users

For me, discovering that it was possible to create multiple Users in Chrome and Windows has been a real game changer.

I used to need to login to multiple different email accounts constantly throughout the day in order to get some work done. And after a time, some accounts would be automatically logged out. And I’d often loose track of what I was working on, or which tabs I needed open for different tasks.

But with multiple Chrome users, I’m able to separate the tabs and emails I’m using for different accounts quite easily, and keep them separate. I open a different User account whenever I need to switch tasks.

The same is true for multiple Windows users. By creating multiple users in Windows, I’m able to keep my files and programs separate from everyone else in my family who also uses the same computer.

In this way, whether in Chrome or Windows, each user profile, and all their content and settings, can be customized to the particular user who needs it.

Acceptable Use Policies

What is an Acceptable Use Policy?

An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.  Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.
– WhatIs.com

This is something that came up a few times at the high school I was working at. In principle, the high school owns the email accounts and all the computers that students and faculty use while at school. So, any inappropriate use can be disciplined by the school.

Examples of inappropriate use:

  • Student: bullying classmates via the school email, looking at inappropriate things on the school computers, harassing or attempting to blackmail teachers with the school email
  • Teacher: job hunting with the school email, looking at (or showing) inappropriate things on the school computers, etc

General Guidelines:

I think it is always a good idea to remember WHICH email account you are using when you send messages, and WHO OWNS the email or the devices you are using. Here are some general AUP guidelines to help you stay safe:

  1. Keep things professional (at all times)
  2. Your school / company owns your school email, office device, etc
  3. Scheduling / socializing with students outside school hours (including instant messaging) needs to be handled with caution, and is not recommended
  4. Keeping door codes & computer passwords secure is important (beware of writing down passwords near your computer, or students looking over your shoulder as you type the password or enter the door code)
  5. A zero-tolerance policy for bullying and harassment might be advisable

Back to Top


Part THREE: Technology Learning options

In this Teacher Training course – which runs for 18 weeks – we will study many of the following apps. I’m presenting this list to you here for future reference and also to see which you may have heard about and which you may be interested in learning more about.

Anything with a red asterisk * is what we will definitely study. After Row One (Google tools), apps are presented in alphabetical order.

  • Row ONE
    • * Google Classroom (Publish class content, collect & grade assignments)
    • * Google Docs (Collaborate on assignments, create books / journals)
    • * Google Sheets (Create schedules, calendars, lists, graphs, charts, grade books, etc)
    • * Google Slides (Create PPTs, PDF books, journals, posters, edit images)
    • * Google Drawings (Create images, graphics, charts, logos)
    • * Google Forms (Create surveys, quizzes, analyze student data)
    • * Google Sites (Publish digital portfolios, keep students & parents up to date)
    • * YouTube (Create, edit, & subtitle videos – good for learning reflection)
  • Row TWO
    • * Audacity (Create audio files, listening tests, etc for FREE)
    • Blogger (Let students show what they know, reflect, journal project progress, etc)
    • Book Creator (Web & iOS, create books, portfolios, audio files, etc)
    • Book Widgets (Create interactive exercises & auto graded tests)
    • * Canva (Create online graphics, books, presentations – a Korean-version is known as Miricanvas, but Canva includes design tutorials)
    • Code.org (Create programs, games, and animations with Blockly, an easy-to-learn coding tool)
    • Explain Everything (Whiteboard app that lets you draw, create content, record and narrate everything on your screen)
    • Flipgrid (A video-response platform where students record responses to published videos of their classmates)
  • Row THREE
    • Formative (Formative assessment tool that lets students respond by writing on their screens)
    • * Kahoot (Create competitive quizzes that can be done in class)
    • Metaverse (Augmented Reality magic for teachers and students)
    • * OBS (Open Broadcaster Studio allows you to record whole classes on your computer, including using a webcam and PPT, for FREE)
    • Padlet (Collaborate and share work or assignments with anyone in the class)
    • * Plickers (No-device-required interactive quizzes)
    • * Quizizz (Interactive quizzes like Kahoot with more quiz options)
    • Quizlet (A flashcard and spaced repetition quiz app)
  • Row FOUR
    • ReCap App (Students verbalize their thoughts and reflect on their learning with video and audio creation tools)
    • Screencastify (Record what happens on your screen with this Chrome extension)
    • Seesaw (A comprehensive digital portfolio app and website)
    • Socrative (A popular formative assessment tool that helps teachers gather student info from closed- and open-ended questions)
    • Soundtrap (A collaborative digital audio workstation for students to make audio files)
    • WeVideo (A web-based video creation platform)
    • Talk and Comment (Another Chrome extension that lets students leave voice notes in any web page)
    • * Zoom (The definitive video-conferencing app)

Thanks!

I hope this presentation was helpful for introducing this class. I look forward to learning a lot together with you this semester!

Back to Top

Using Quizizz in the Classroom

Quizizz is an app and website that is quite similar to Kahoot with a few interesting additions. Like Kahoot, a user can create a series of questions to ask a group of people who compete to answer them correctly and speedily. Scores are determined according to whoever answers correctly first.

Quizizz, unlike Kahoot, adds some additional features to the game itself including different Theme choices and Power-ups. And in Quiz creation, whereas Kahoot only has two “free” question types (multi-choice and true/false), Quizizz has a total of FIVE possible options:

  1. Multiple choice (one correct answer)
  2. Checkboxes (more than one correct answer)
  3. Fill in the blank (correct answers + alternatives)
  4. Open-ended (no correct answers, opinion based)
  5. Poll (multiple choice – or checkboxes – opinion based)

Quizizz also adds the option of connecting to Google Classroom to assign quizzes for homework to your classes.

Uses for the Classroom

  • Surveys (interest, voting, etc)
  • Competitive Quizzes / Games
  • Informal skills / knowledge tests & assessments (Reports)
  • Assign as Homework (Google Classroom connection)

Recommendation: As with Kahoot, Quizizz also has an app where it is possible to create and edit quizzes. However, I it is still slightly easier to find everything on the website (the screen is larger), and you will likely be hosting your quizzes from the computer. So it is a good idea to familiarize yourself with the website first.

Step 1: Sign up / in

  1. Go to quizizz.com and click “Sign up”
  2. Sign up with your Google account (or email)***
  3. Select your role (Teacher)
  4. Select how you are using it (At a School)
  5. Welcome to the Dashboard

*** Important note about “Sign up”

In the Sign Up screen, you have TWO options:

  1. Sign up with Google
  2. Sign up with email

Whichever option you choose to sign up with MUST be used to sign in later (and they do not overlap each other). For example:

  • if you sign up with Google, you CANNOT use Email / Password to sign in later
  • if you sign up with Google, you MUST use Google to sign in later

Why “Google” and “Email / password” are not the same

The reason for this is because of the authentication (sign in) method used by the website.

  1. Google Sign In log you in with an authentication TOKEN
    • (A separate window opens where you log in to your Google account separately. Once you authenticate (login) with Google, your email service sends a unique authentication TOKEN to Quizizz in order to confirm your identity. So, in this case, Quizizz does NOT store your password at all, but rather relies on the TOKEN provided by Google to log you in.)
  2. Email / password will remember both your email AND your password
    • (The password is actually passed through a hashing algorithm in order to scramble it so it can’t be intercepted by another user. The scrambled password is matched with the scrambled password stored in the database for your user ID, and if the two scrambled passwords match, your identity is confirmed and you are logged in. So, in this case, Quizizz stores BOTH your email AND scrambled password in their database.)

That is why the two sign in methods are not compatible (interchangeable).

  1. Email / password = uses your email / password (and remembers both)
  2. Google = uses a TOKEN (and remembers only your email)

Step 2: Search for / Create a Quiz

  1. “Search” for quizzes to use
    1. You’ll be shown a list of relevant search results
    2. Select one to view (you can also Like or Save them to a Collection). From here you can Play Live, Assign HW, or Practice
  2. “Create” a new Quizizz of your own
    1. Write your own question at first to familiarize yourself with the Question Types
    2. There are FIVE Question Types shown above:
      1. Multiple choice (one correct answer)
      2. Checkboxes (more than one correct answer)
      3. Fill in the blank (correct answers + alternatives)
      4. Open-ended (no correct answers, opinion based)
      5. Poll (multiple choice – or checkboxes – opinion based)
    3. After you finish creating questions, you’ll still be able to Edit them
    4. Click “Done” in the upper-right to finish the Quiz (you must choose a grade level, and can also add additional details)
    5. The Quiz will then appear in “My Library”
    6. If you click on your finished Quiz, you can Play, Assign HW, or click “Edit” in the Quiz details box to edit it further

Step 3: Play / Assign a Quiz

To Play or Assign a Quiz as Homework, first select the Quiz you want either from Search or from “My Library.”

  1. From Single Quiz View
    1. Assign HW – brings up options for date, time, and class (linked to Google Classroom)
    2. Play – gives a few options like Team, Classic, and Test (choose Classic)
  2. The Teacher’s View shows the Quiz ID students need to enter to join the quiz
  3. Students navigation their Internet browsers to joinmyquiz.com and enter the ID
    1. Students may choose a Nickname (and other options)
    2. Then, select a Theme
  4. From the Teacher’s View, once the students have all joined, they may now “Start” the Quiz
  5. Students are show a question
    1. And may click their answer – they are awarded points and bonuses depending on their answers and time elapsed
  6. Teachers can watch student progress through the quiz
    1. And at the end of the quiz, they are shown a report with statistics from the quiz results
  7. Students also can review their own performance after the quiz

Step 4: Quiz Reports + Google Classroom

As mentioned above, at the end of a quiz:

  1. Teachers can immediately view the quiz results
  2. Students also have their own quiz results review page
  3. Additional Reports can be found in the “Reports” link in the left sidebar
    1. A single report view shows the full list of students who took the quiz as well as all their answers, and statistics about the quiz. It’s well worth investigating.
  4. Finally, Google Classroom can also be linked to Quizizz from the “Classes” link in the left sidebar

I hope that gives you a good overview of using Quizizz in your classrooms. There is much to explore, so just take some time to familiarize yourself with the program. Again:

  1. I recommend getting familiar with the website FIRST
  2. And then going back in to the app to learn it

Once you know what is available in Quizizz through the website, it’ll be a lot easier to find it in the app.

Good luck!~

Using Kahoot in the Classroom

Kahoot is an interesting app and website that allows one user to create a series of questions to ask a group of people who compete to answer them correctly and speedily. Scores are determined according to whoever answers correctly first (points are allocated in decreasing amounts to second place, third place, and so on).

Uses for the Classroom

  • Competitive Quizzes / Games
  • Informal skills / knowledge tests & assessments (Reports)

Recommendation: Although the Kahoot App also makes it possible to create and edit Kahoots, I remember doing MOST tasks on the computer because it is slightly easier to find everything (the screen is larger), and you will likely be hosting your Kahoots from the computer. So it is a good idea to familiarize yourself with the website first.

Step 1: Sign up / in

  1. Visit kahoot.com
  2. Click “Sign up” in the upper-right hand corner
  3. Select your Account type (Teacher)
  4. Select your Workplace (School)
  5. Create account ***
  6. Select your Edition (Free)
  7. Provide additional info (optional)
  8. Explore the Dashboard (Get Started)
    1. See how it works
    2. Create kahoot
    3. Host kahoot

*** Important note about “Create account”

In the Create Account screen, you have THREE options:

  1. Email / password
  2. Sign up with Google
  3. Sign up with Microsoft

Whichever option you choose to sign up with MUST be used to sign in later (and they do not overlap each other). For example:

  • if you sign up with Google, you CANNOT use Email / Password to sign in later
  • if you sign up with Google, you MUST use Google to sign in later

Why “Google” and “Email / password” are not the same

The reason for this is because of the authentication (sign in) method used by the website.

  1. Email / password will remember both your email AND your password
    • (The password is actually passed through a hashing algorithm in order to scramble it so it can’t be intercepted by another user. The scrambled password is matched with the scrambled password stored in the database for your user ID, and if the two scrambled passwords match, your identity is confirmed and you are logged in. So, in this case, Kahoot stores BOTH your email AND scrambled password in their database.)
  2. Google and Microsoft Sign In log you in with an authentication TOKEN
    • (A separate window opens where you log in to your Google or Microsoft account separately. Once you authenticate (login) with Google or Microsoft, your email service sends a unique authentication TOKEN to Kahoot in order to confirm your identity. So, in this case, Kahoot does NOT store your password at all, but rather relies on the TOKEN provided by Google or Microsoft to log you in.)

That is why the two sign in methods are not compatible (interchangeable).

  1. Email / password = uses your email / password (and remembers both)
  2. Google / Microsoft = uses a TOKEN (and remembers only your email)

Step 2: Create / find a Kahoot

You may wish to investigate Kahoots that have already been created first to get an idea for the kinds of things that are possible. Click “Discover” in the top menu to do so. Later, you may wish to “Create” your own (top-left button).

  1. “Discover” Kahoots (top menu button)
    1. Search for a Kahoot that looks interesting
    2. Select it to view the questions
    3. Some Kahoots you may be able to Edit, or add to your own Library. Others you may only be able to Favorite and Play with your class
  2. “Create” your own Kahoot (top-right button)
    1. Create a New Kahoot or use a Template
    2. You can modify an existing Template
    3. Or, if you are creating a New Kahoot, type your own questions and answers
    4. Question Types:
      1. Quiz (4 choices)
      2. True / False (2 choices)
      3. Typing (premium)
      4. Puzzle (premium)
      5. Poll (premium)
      6. Slide (premium)
  3. After creating a Kahoot (or using a Template), find it in your Library of Kahoots under the “Kahoots” button in the top menu

Step 3: Host your Kahoot

To host / play your Kahoot:

  1. View your Kahoots Library
  2. Click “Play” on the Kahoot you want to host
  3. Click “Teach” to play it in class
  4. Select “Classic” in Game options (you may also want to change or disable the Lobby music toward the bottom of the screen)
  5. When you Start the game
    1. The screen on the right will appear on your projector / computer
    2. Students should go to kahoot.it to enter the Game PIN on their devices
    3. Students can choose a Nickname (caution: some students may try to choose joking or rude nicknames)
    4. Once all students have entered the Game PIN and a nickname, Start the Game
  6. Questions will be shown on screen with a timer
  7. Students select the correct answer from the group of symbols on their device
  8. After all students have answered (or time is up) the correct answer will be shown on screen
  9. Finally, a leaderboard will be shown and tally up each player’s points

Step 4: Kahoot Reports

You will also be able to see a detailed analysis of the results of a played Kahoot in the “Reports” tab.

  1. Click “Reports” in the top menu
  2. Select the Kahoot you want to view reports for
  3. Detailed analysis includes:
    • Correct %
    • Difficult questions
    • Students who need help
    • Students who didn’t finish

I hope that gives you a good overview of using Kahoot in your classrooms. There is much to explore, so just take some time to familiarize yourself with the program.

  1. I recommend getting familiar with the website FIRST
  2. And then going back in to the app to learn it

Once you know what is available in Kahoot through the website, it’ll be a lot easier to find it in the app.

Good luck!~