Sie sind auf Seite 1von 15

Cainta Catholic College

A.Y 2019-2020

Senior High School Department

Practical Research 2:

Effectiveness of Wix.com in Senior High Students of Cainta Catholic College

Presented by:

Elvira, JhonWinford
De Guzman, Manoel Lean
Esconde, Immanuel
Duron, Mark Boni
Manual, Jomel
Lopez, Raphael Inigo
Amante, Carl Arsenio
Grade 12 ICT – Our lady of pillar

Submitted to:

Mrs. Yadao
Review Related Literature

Pinggera, A. (2019) Wix offers an easy drag-and-drop site builder to create small
websites. There are 100s of free templates available. Wix provides its own web hosting as
well as domain names (free and paid). The Wix App Market makes it easy to add extra
functionality such as photo galleries or ecommerce.

According to Nichols, Jessie-Lee (2013) Building a business in Wix is a failure, it


does not have any search engine optimization (SEO) the user can build an attractive
website and has an ease of access in making your website but she questions that how it is
going to work if the site does not have any search engine compatible. Wix can also
modify your site and its content by agreeing to their Terms of Use. Meaning you do not
have a full control in your site for wix can modify your websites freely.

Horne, K. (2019) Wix is a genuine What You See Is What You Get (WYSIWYG)
website designer—however that makes it madly simple to make a site, since you can
perceive what you are doing as you work, without exploring through a lot of menus.The
downside to the easy-to-use web builder is that there aren’t many advanced features—
though realistically, most users won’t even notice. Users can’t add their own HTML code
directly, though, an HTML code app allows for the addition of external code. Wix
templates are pretty well designed, though Wix has some unusual PowerPoint-like
features, including adding transitions between pages and animations. These might be a
feature some find in handy, but just like fancy animations aren’t very professional in a
business PowerPoint, many will be better off leaving those options alone. At any time
during the editing, the site can also be previewed as the mobile version instead of the full
version using the icons at the top left of the editor.

According to Cox, Janelle (n.d.) Educating with innovation can develop


understudy learning by supporting instructional goals. Be that as it may, it very well may
challenge select the "best" tech devices while not dismissing your objectives for
understudy learning. When distinguished, incorporating those instruments would itself be
able to be a test yet an educational encounter. The CTL is here to support you (learner,
master and everybody in the middle of) find imaginative and helpful approaches to
incorporate innovation into your group. On the off chance that you are hoping to flip your
class, utilize Canvas or just need to try different things with some new instructional
advances, we can help.

Brady et al. (2010) A study conducted by Brady et al. on effectiveness of an


education-based social networking sites or virtual learning environments in education
supported the idea of a great potential of these online educational platforms as a
supplementary tools for a face-to-face class. (Brady et al. 2010). There are many
educational activities that can be done in virtual learning environments such as online
assignments, discussions, and other tasks. For example, computer based assignments are
very crucial in assessing students’ progress. Computer based assignments are an effective
way of ascertaining students’ understanding of concepts. Students also learn more
quickly, demonstrate greater retention, and are better motivated to learn when they work
with computers (Koert, 2000).
References

1. Hayut, Y. (2018). Post | Wix Blog | Web Design & Small Business Tips to Promote Your
Site. [online] noCodeBA. Available at: https://www.wix.com/blog/2018/12/why-teach-
kids-to-code/ [Accessed 15 Jul. 2019].
2. Enriquez, M. (2014). Students’ Perceptions on the Effectiveness of the Use of Edmodo as
a Supplementary Tool for Learning. [online] Dlsu.edu.ph. Available at:
https://www.dlsu.edu.ph/wp-content/uploads/2018/09/LLI-II-
010.pdf?fbclid=IwAR0Wpa1amTiQujCxaEvRSgt8lQgy5TdzfQoKsK2WZO1Ncoizm3t6
bvFCAZ4 [Accessed 15 Jul. 2019].
3. Horne, K. (2019, January 12). Wix Review: The World's Most Popular Website Builder
Reviewed. Retrieved from https://websitebuilders.com/reviews/wix/

4. Nichols, J. (2013). 3 Reasons I Hate WIX.COM for Business Websites. [online]


Impactbnd.com. Available at: https://www.impactbnd.com/blog/3-reasons-wix.com-fails-
for-business-websites [Accessed 15 Jul. 2019].
5. Cox, J. (n.d.). Teaching, Using Technology in the Classroom. [online] TeachHUB.
Available at: http://www.teachhub.com/teaching-using-technology-
classroom?fbclid=IwAR3snpV_HKvGrwbzXD5p_qSI7o0vXoO_O-
E4rX_bwJ2AL9_NTfyiksaGyGM [Accessed 15 Jul. 2019].
6. Pinggera, A. (2019). Wix Review 2019: When (and when not) to use Wix!. [online]
WebsiteToolTester. Available at: https://www.websitetooltester.com/en/reviews/wix-
review/?fbclid=IwAR2-xhDfJGK65yuz1-
T07NXYlwD6_d8gxXppLFWw6al43X1FLUQk1ktguT0 [Accessed 15 Jul. 2019].
7. Hayut, Y. (2018). Post | Wix Blog | Web Design & Small Business Tips to Promote Your
Site. [online] noCodeBA. Available at: https://www.wix.com/blog/2018/12/why-teach-
kids-to-code/ [Accessed 15 Jul. 2019].
8. Sharma, V. (2019). Pros and Cons of Wix Website Builder - KLIENT SOLUTECH.
[online] KLIENT SOLUTECH. Available at: http://www.klientsolutech.com/pros-and-
cons-of-wix-website-builder/ [Accessed 15 Jul. 2019].
Cainta Catholic College

A.Y 2019-2020

Senior High School Department

Practical Research 2:

Effectiveness of Implementation of Using Mobile Phones during Class hours in Cainta


Catholic College

Presented by:

Elvira, JhonWinford
De Guzman, Manoel Lean
Esconde, Immanuel
Duron, Mark Boni
Manual, Jomel
Lopez, Raphael Inigo
Amante, Carl Arsenio
Grade 12 ICT – Our lady of pillar

Submitted to:

Mrs. Yadao
Review Related Literature

Thomas, K, & Muñoz, MA. (2016) An investigation led in the US uncovers concerns
held by certain understudies about the dangers associated with enabling cell phones to be utilized
openly at school. The examination, Hold the phone! High School Students’ Perceptions of
Mobile Phone Integration in the Classroom,, which was distributed in 2016, found that albeit
seven out of 10 of understudies talked with think cell phones bolster learning, genuine concerns
still exist among 30 percent of respondents, who feel the negative impacts of cell phones
legitimizes a school-wide boycott.

Over the 628 understudies overviewed, stresses extend from general diversion (for instance,
telephones ringing during class) to fears about different understudies utilizing cell phones to
cheat, sext and cyberbully.

Notwithstanding this, the investigation additionally discovered that 90.7 percent of the
understudies studied were utilizing their cell phones for school-related work.

The creators of this examination state that school approach producers ought to think about these
discoveries and 'grow clear arrangements on proper homeroom cell phone use just as
ramifications for their abuse … anticipating that schools should totally dispense with the issues
related with cell phone reconciliation, nonetheless, is ridiculous; thusly, school partners should
cautiously consider the advantages and hindrances distinguished by understudies in deciding
strategy.'

Walker, R. (2013) The investigation titled "I don’t think I would be where I am right
now.” Pupil perspectives on using mobile devices for learning. The outcomes demonstrate that
43 percent of understudies going to the school where gadgets are prohibited are as yet utilizing
them to help with learning regardless of the boycott. In the interim, 74 percent of understudies at
the school which permit them utilize the gadgets to help learning.

Most respondents in this investigation state they utilize their gadget for Google and schedules
during the school day. With respect to learning at home, most understudies likewise depend on
their gadget.
'A couple of days prior, my companion didn't comprehend one of the inquiries on the Science
schoolwork, so he Facetimed me, and I demonstrated to him my answer and I clarified how I
found that solution to him ...' one understudy says.

The examination demonstrates that understudies depend for the most part on their gadgets
to keep them sorted out. The schedule, cautions and camera (generally to take photographs of an
educator's notes) are includes always utilized by understudies, the report notes. 'One student said
his gadget was fundamental for "recollecting things" and without he would "neglect to take
schoolwork in a ton".'

Generally speaking, this examination suggests that cell phones are a reasonable learning
instrument for the study hall.

There is clear proof that numerous understudies feel that they are getting instructive
profit by the utilization of their gadgets,' the report says. 'They are utilizing huge numbers of the
highlights of their gadgets and regularly finding inventive approaches to utilize these highlights
in their homework, both at home and at school.'

Grant, M.M, Tamim, S., Brown, D.B., Sweeney, J.P., Ferguson, F.K., & Jones, L.B
(2015). The study , teaching and learning with mobile computing devices from 2015 details the
experiences of one Mathematics teacher, Steven, who uses an iPhone in class.

'Steve utilized his own iPhone to report understudies' work and participation,' the examination
says. 'He transferred checked tests, tests, assignments, and photos into an online programming
application called Evernote. Every one of his understudies [primarily ninth and tenth graders]
had a document in this program … this was useful to Steven when directing formal and casual
parent-educator gatherings and furthermore when talking about with different instructors and
organization.

'Steven appreciated the adaptability of cell phones by holding class in areas other than his
study hall, for example, the assembly hall and outside … [and] he could utilize his iPhone to
"pull up each report [he's] ever filtered in and get an a lot greater, significantly more precise
picture" of an understudy's advancement.'
In spite of the fact that members in this investigation state utilizing a cell phone in the
study hall included the requirement for investigation and a ton of individual research, the
creators propose that with the developing pattern of BYOD, schools ought to consider
incorporating cell phones into exercise plans.

Brooks, A. (2019). The requirement for quick correspondence among understudies and
organization is such a need, that USA Today announced that Morrisville State College in New
York appropriated mobile phones to understudies and added the month to month bill to their
standard school charges. Since fresher PDAs and advanced mobile phones incorporate email get
to, understudies can utilize their PDAs to browse their grounds email accounts. Individual
computerized associates (PDAs) like the BlackBerry highlight web perusing, which empowers
understudies (particularly those taking courses on the web) to get to their course materials from
anyplace. Telephone calls, content informing and texting are intensely utilized on school grounds
where understudies are relied upon to not just stay aware of their companions and colleagues yet
with their examinations too. As expressed in the article "The Age of the Smart Cell Phone,"
various school grounds over the United States are using mobile phones and advanced cells to
send significant messages to understudies with respect to enlistment, money related guide and
assignments.

Because of their portability and instant connectivity, many schools are also struggling to
deal with increases in cheating that cell phones allow. For example, according to the article
"Gadgets Rule on College Campuses," twelve University of Maryland business students were
caught using their cell phones to cheat during a final exam in 2003. Another problem that
instructors and students face is the disruptive nature of mobile phones in the classroom. Many
classrooms have a "silent" or "vibrate" policy for cell phones during lecture or lab time, but
students can undermine that rule by silently sending text or instant messages during class.
"Gadgets Rule on College Campuses" also reports that many are concerned with the inflating
costs of keeping college campuses so tech-savvy, as much of the costs for the installation and
maintenance of wireless networks for computers and cell phones are added to student's fees.

After the frequencies of grounds brutality at Northern Illinois University and Virginia
Tech, moment grounds wide correspondence turned into a need. Numerous grounds currently
have understudies, personnel and staff registers for wellbeing related correspondences through
their PDAs. The organization Rave Wireless offers two unmistakable wellbeing highlights that
work with a PDA or different remote gadget. When enlisted, if an understudy is in threat he can
call the grounds police, who will promptly get the understudy's whereabouts, recognizable proof
and other data expected to help them. On the off chance that there is an episode with the
capability of being a grounds wide danger, security authorities can issue an alarm to every single
enlisted client to either empty a zone or look for asylum somewhere else. These cautions can
come as a computerized telephone call, an instant message or an email (if pertinent to the client's
telephone).

Since the 21st century Era, individuals have turned out to be connected to electronic
gadgets. Indeed, even an underdeveloped nation like the Philippines has invited and grasped the
computerized culture. Truth be told electronic gadgets best on the rundown of imported products
in the Philippines. Thus, a run of the mill understudy appreciates a couple of contraptions inside
the scope of his or her pocket. However, the thing is, most schools restrict bringing electronic
gadgets – which I think needs a patch up.

Regardless of whether bringing these inside the grounds is expressly stipulated in the
understudies' handbook, despite everything they would bring these in school whether for
correspondence for their folks (which amusingly that guardians themselves provide for their
children realizing it is a restricted gadget) or just for their own excitement. In its least complex
sense – each understudy who has one (covered up or on display) is a guilty party, well the
guardians obviously is an accomplice to the offense.

These gadgets also known as “contraptions" could be an incredible apparatus in learning.


It could essentially supplant a straightforward word reference, adding machine, intermittent table
of components, and so forth. It additionally can be utilized in Physics when examining
movement of items, transformation of units, table of physical constants, maybe recording of
one's voice in an English class or music class, tuning in to book recordings, something to be
utilized in replicating addresses and notes at that point offering it to the rest by means of long
range informal communication locales. There are several digital books around while a few
schools have really substituted tablets for their reading material.

As I would like to think, the standard itself against these contraptions is the reason they
have an infringement and we as an instructive organization really pass up on the chance to give a
significant, significant exercise to our understudies. Unmistakably, we have not really show them
how to mindfully utilize their contraption or to give them a chance to appreciate these things
without overlooking decorum that one must acknowledge in owning one. Sure there are seas of
reasons why we don't permit them (like swindling and so forth.) to however that is just in light of
the fact that we had not shown when or how to utilize it fittingly. In the event that our instruction
is extremely a readiness for this present reality, what is preventing us from giving them a chance
to utilize those things capably?

While some school that has adjusted in this time in managing this issue (you should need
to check PSHS' "reasonable use strategy”), we just state "NO" to it. Time has transformed, it may
likewise imply that a few standards, decides that may not appear to be any longer legitimate may
not matter and thusly should change
References

1. Thomas, K, & Muñoz, MA. (2016) 'Hold the Phone! High School Students' Perceptions
of Mobile Phone Integration in the Classroom', American Secondary Education, vol.
44, no. 3, pp. 19-37. https://www.ashland.edu/coe/about-college/american-secondary-
education-journal
2. Walker, R. (2013) “I don't think I would be where I am right now". Pupil’s perspectives
on using mobile devices for learning, Research in Learning Technology, vol. 21, pp. 1-
12.
3. Grant, M.M, Tamim, S., Brown, D.B., Sweeney, J.P., Ferguson, F.K., & Jones, L.B
(2015). Teaching and learning with mobile computing devices: Case study in K-12
classrooms. TechTrends: Linking Research and Practice to Improve Learning, 59(4),
32-45.
4. Brooks, A. (2019). Use of Mobile Phones on a College Campus. [online] Techwalla.
Available at: https://www.techwalla.com/articles/use-of-mobile-phones-on-a-college-
campus [Accessed 24 Jul. 2019].
Cainta Catholic College

A.Y 2019-2020

Senior High School Department

Practical Research 2:

Exposure of Security and Privacy Information in Social Networking

Presented by:

Elvira, JhonWinford
De Guzman, Manoel Lean
Esconde, Immanuel
Duron, Mark Boni
Manual, Jomel
Lopez, Raphael Inigo
Amante, Carl Arsenio
Grade 12 ICT – Our lady of pillar

Submitted to:

Mr. Arcilla
Review Related Literature

Jahid, S. and Borisov, N. (2019) Online person to person communication is the following
accepted method for communication. We accept that protection in OSNs is an emerging topic,
and scientists are as yet chipping away at security and privacy features of OSNs. Different
techniques come with their own benefits and deficiencies. In this proposition, we have mentioned
two procedures to upgrade security and privacy properties of OSNs. We are as yet chipping away
at access delegation in a solitary and multi-expert arrangement of the proposed cryptographic
procedure EASiER. For the decentralized architecture DECENT, our emphasis is on upgrading
and adding OSN highlights while improving execution by considering various approaches. Our
current test results show that an OSN with upgraded security and protection properties is
practical as far as execution.

Alsoufi, M. (2016) The issue we are confronting now days is protection and security of
data of web based life clients. The online life is accessible in numerous structures like web
applications and advanced mobile phone applications. The clients of online networking utilize
these every accessible application at all accessible stages. Because of this various accessibility of
uses the security and protection of data of web-based social networking clients has more
concerns. So utilizing web based life in a safe domain where the clients fell agreeable and secure
about their data is an exceptionally testing undertaking. All things considered the online
networking applications suppliers have their emphasis on improving and presenting and
expanding the current highlights officially accessible. In any case, they have a little consideration
towards the security and security of their client's data.

Amiriyan, M. (2019) According to the protection examination perspective, determinants


would direct the favourable circumstances and relating risks that impact a client's decision to
disclose certain qualifications. It moreover suggests that people are rarely anxious to forego
some protection for a satisfactory degree of peril. By using Social Networking Sites [4],
individuals open themselves to various sorts of risks that have the standard effect of breaking
their security. It had seen that protection might be assaulted in a couple of ways if individual data
isn't used sensibly and constantly. The makers suggest that confined in which assurance can be
assaulted is through unapproved access to social client data in light of security break or poor
procedures disablement. Notwithstanding that, they had evaluated the protection interruption can
in like manner occur as discretionary use where data accumulated for one plan is used to meet
various terminations, without the learning or consent of the data owner. In any case, if the best
possible data systems and practices outfit individuals with power over the disclosure and usage
of their own information, security concerns can be mediated. In an equivalent strand, the theory
stipulates that exposure is sure to strong instruments that license clients to control the sum they
reveal in light of their destinations, learning and attitudes toward insurance. In the association of
online social range relational correspondence, such cut-off guideline can be practiced through the
usage of security settings [8]. These protections setting improve clients' ability to uncover the
data and also clearing route for giving data of settings to the need.

Breach of Information Disclosure

The real misfortune of the security concerns bargains that the client certifications is like
an implicit understanding where the clients exchange their very own information against money
related or nonmonetary rewards. It is extremely evident that wise clients will continue looking
into such an implicit understanding the length of the favourable circumstances outperforms the
present and future risks of introduction It has been set to use the wants to uncover the clients’
data given on Social Networking Sites. Since the proposed objective goes for watching the
effects of characteristic focal points, exposure point are part into two develop: one quantifies
client' pre-remunerate availability to uncover while substitute estimates their prize moved
capacity to uncover. The nonappearance of characteristic outward capability [2] in prior works
inferred that disclosure objective could be estimated explicitly from significant free create.

Harvey, and Soltren, Jose Hiram. (2005). Through their research they analyzed the
Facebook system in terms of Fair Information Practices as recommended by the Federal Trade
Commission. In light of the information available and the system that protects it, they used a
threat model to analyze specific privacy risks. Specifically, intruders are exploiting security
holes. For each threat, they analyzed the efficacy of the current protection, and where solutions
are inadequate.

Gross, Ralph, and Acquisti, Alessandro. (2005) They evaluate the amount of information
they disclose and study their usage of the site’s privacy settings. They highlight potential attacks
on various aspects of their privacy and show that only a minimal percentage of users change the
highly permeable privacy preferences.
References

1. Jahid, S. and Borisov, N. (2019). Enhancing Security and Privacy in Online Social
Networks. [online] Semanticscholar.org. Available at:
https://www.semanticscholar.org/paper/Enhancing-Security-and-Privacy-in-Online-
Social-Jahid-Borisov/816aa20dcc15eb648c704aaf8b1cd55349bf55a3 [Accessed 24 Jul.
2019].

2. Alsoufi, M. (2016). Social media users information security and privacy. [online]
Academia.com. Available at:
https://www.academia.edu/38376911/Social_media_users_information_security_and_pri
vacy [Accessed 24 Jul. 2019].

3. Amiriyan, M. (2019). On Privacy and Security in Social Media – A Comprehensive


Study. [online] Academia.com. Available at:
https://www.researchgate.net/publication/301234158_On_Privacy_and_Security_in_Soci
al_Media_-_A_Comprehensive_Study [Accessed 24 Jul. 2019].

4. Jones, Harvey, and Soltren, Jose Hiram. (2005). Facebook: Threats to Privacy.
6.805/STS085

5. Gross, Ralph, and Acquisti, Alessandro. (2005). Information Revelation and Privacy in
Online Social Networks. Proceedings of WPES'05. (pp. 71-80). Alexandria, VA:
Association of Computing Machinery (conference paper)

Das könnte Ihnen auch gefallen