-
Beware of Quishing: New phishing technique
In the digital age, technology is developing rapidly and so are the methods used by cybercriminals. One of these new threats is Quishing, a form of phishing using QR codes.
Translated by
ArticleTeacher, ICT co-ordinator, … -
From nursery to adult education in Flanders: Brochure Dutch and Ukrainian
Education Flanders wants to welcome parents and children from Ukraine and show them the way in education. Going to school and studying is a way to meet new people, to master the language and to work for the future. In this brochure parents are …
Translated by
ArticleTeacher, Other -
Bert Smits About Everyone Schoolmaker
Schoolmakers is an organization that guides schools in learning and change processes. In 2020, director Bert Smits and colleague Yves Larock released Everyone Schoolmaker , a book with guidelines to help schools adapt to a rapidly changing world. We …
Translated by
ArticleTeacher -
Making a mouth mask: Ferm
Wearing mouth masks will play an important role in the reduction strategy of the corona measures. This is especially true in those situations where the distance of 1.5 meters is difficult to achieve. Homemade mouth masks also offer a sufficient …
Translated by
Article (3)Teacher, ICT co-ordinator, … -
Make your own mouth mask
How do you make a mouth mask in corona times when you should stay 'in your room' as much as possible and you don't have a 'regular' mouth mask? After all, you have to go to the store or take the bus to work. Or you're at …
Translated by
ArticleTeacher, ICT co-ordinator, … -
Eight tips for Zoom Meetings: The digital meeting application on your tablet or smartphone
In this article you can read about the extensive possibilities of the Zoom platform as an application on your smartphone or tablet. The app makes it possible to teach students or to meet with colleagues from home.
The different functions are …
Translated by
ArticleTeacher, ICT co-ordinator -
Two-factor authentication: What is it?
Two-factor authentication makes cyber criminals a lot harder to crack your account. With two-factor authentication, you use a second code in addition to the password and user name, which may be sent via sms or which you receive via an additional …
Translated by
ArticleTeacher, ICT co-ordinator, … -
Big data in education: Challenges
Data in education
The use of data in education has many advantages, and is actually not new at all. In fact, you can say: everything that is recorded or stored in terms of information can be used as data. In most schools, the absence of students is …Translated by
ArticleTeacher, ICT co-ordinator, … -
From Web 1.0 over Web 2.0 to 3D internet
Twice a year, the Department of Teacher Training at the KHLim organizes a (inter) departmental study day with staff choosing three to four sessions from different fields. This time language, care, talent, ICT, guidance, diversity and art. This is …
Translated by
ArticleOther