Pages

Succeeding At Homeschooling

A couple of my friends shared this post today: https://bethanyishee.com/homeschool-gaps/

I wanted to applaud the author, Bethany Ishee, and add a couple of my own thoughts to hers:

One of the things I love most about homeschooling is re-learning the science or history I learned incorrectly in school. I knew in fifth grade that not everything they taught in school or that my teacher said was always the truth after Mt. St. Helens blew and there were several aspects of that eruption that did not match with what was taught. For example, that it took millions of years to petrify trees, and some other misinformation regarding mountain formation.

There were things I went to research to tell the girls for history that I had been taught - only to find those things totally untrue. If we are willing to learn, we continue to learn and grow, and sometimes have to unlearn. For example, not only did Marie Antoinette not say, "Let them eat cake," she was not referring to the first, burned loaf of bread from the oven, and she did not say, "Let them eat brioche." The phrase was one penned by Rousseau in Confessions when Marie Antoinnette was only nine and published later when she was twenty-six, eleven years before her demise.

There are things I teach my girls at young ages telling them, "I don't expect you to remember this exactly, but just to plant a seed so that when you are exposed to this later, you'll have some recollection of it so it is easier to grasp when you are older rather than it being a totally new concept." They appreciate that they get to learn some new things that they don't have to memorize or be tested on at the time, but that they get to experience and experiment with at a younger age for fun.



Some people struggle with spelling. I struggle with dates - especially battles in wars. As an adult, I had new books I could read that I didn't know about in school, new media available to help present the history in a new way, etc. These things gave me a fuller picture of history than I had in school. Textbooks can only teach so much, it takes experience and practice and immersion to learn many things. What things are most important depend on what one's goals are.

This cemetery in Georgia was important in the Civil War. I didn't know anything about it until my husband's uncle was interred there.

If we succeed in generating a love of learning, the learning won't end with us. If we succeed in teaching diligence and discipline, their continued ability to apply themselves to learn those things they need for their career or just for a hobby and enjoyment will propel their success. If we succeed in giving them a can-do attitude - or at least a willingness to try new things attitude - they will grow and have new experiences that add to their quality of life and to the depth of the person they are.

Woohoo! I'm a "North Country Farmer" Guest Tonight

I am honored to be a guest tonight at 7:00 pm CST on Scott M. Terry's "North Country Farmer" radio show, even though I am in the south. :-) To listen in tonight or listen later, go to: http://www.blogtalkradio.com/christian-farm-and-homesteadNorth Country Farmer Radio Show.

My public speaking students get to do a little "turnabout is fair play" tonight and critique my speaking skills, including counting my ah's and um's. I better be on my toes tonight! :-)

The topics tonight will include:

  • "Homesteading mistakes: Yeah, we've made a few" a la Queen's "We Are the Champions" theme in my head as I write this.
  • Know what you and your spouse both can and are willing to do - and what you can't do or aren't willing to do
  • Gardening alternatives for bad or rocky soil
  • Preparing for spring storms or summer wildfires
I hope you join in - or listen later if you can't tonight.

Edit: I am terribly sorry about the feedback on the line. I have contacted my phone company today to get that issue resolved. 😓

Tammy's Ginger Tea


I loved reading the original Trim Healthy Mama book, even though it was a bit rambling. There was really good information in it regarding relationships, easy ways of incorporating exercise, and it addressed one concern I had about my children who did not need to lose any weight eating the same food we did - we give them milk with each meal. They sometimes get extra treats, too, but the biggest help was giving them milk.


I had a problem that I needed to address for my health. My parents ran concession stands when I was little and a restaurant when I was a teenager - free soda pop. That had no impact on a very active little girl, but as a young adult who was hooked on soda pop, working at a desk job 12 hours a day 5-7 days per week, it had a huge impact. I needed a way to break my addiction to sodas. Enter: Ginger Tea.

I knew the health benefits of ginger - stomach benefits, cinnamon - anti-microbial, helps with weight loss and insulin insensitivity, and turmeric - anti-inflammatory, natural blood thinner, etc., so after trying their Good Girl Moonshine, I modified the recipe and made my own Ginger Tea.

This broke my cravings for soda, and made me feel so much better overall. Less achy and less prone to illness. If I did catch something, it lasted for a much shorter time than I had experienced previously.

Ginger Tea Ingredients:
  • Ginger root, sliced in 1/8 inch rounds - fresh or frozen.* Powdered ginger works, as well.
  • Cinnamon stick
  • Ground cinnamon
  • Turmeric root, sliced in 1/8 inch rounds or ground turmeric.

*Note on frozen ginger root: When I get ginger root at the store, I bring it home, slice it into 1/16" - 1/8" slices and put them into a freezer-safe baggy or another container in the freezer. This preserves the ginger and keeps it from going soft or moldy. It can be used for this recipe, put into hot oil for use with Asian-inspired dishes, etc. I have kept it in the freezer for 3 months with no issues.

Preparation Instructions:
Into a saucepan, I add 2 cinnamon sticks if I have them, 10-12 +/- slices of ginger root if I have it (if not, add 1 Tablespoon ground ginger into the muslin bag), 1 Tablespoon cinnamon into the muslin bag, and 1 Tablespoon turmeric to the muslin bag. I pull the ties on the bag and make sure it is submerged. If you would like to add 2-4 herbal tea bags you may, but I recommend trying it without first so you know what the basic beverage tastes like.

Bring to a boil. Reduce the heat to low and simmer for 15 minutes. If you do not wish to concentrate the beverage, go to the next step.

To concentrate the drink: bring to a boil again, then reduce the heat to low once more for another 15 minutes. Let cool on the stove a bit (even if you will be drinking it hot, you only need it just above body temperature, not scalding hot.) Remove the muslin bag discarding the spice mixture and rinse out the bag. You can let it air dry once clean. (It will be stained.) You can save the ginger slices and cinnamon for one more use in the next 2-3 days if refrigerated in a container, otherwise, discard those. (After concentrating the beverage, I generally discard them.)

Pour into quart jars using a funnel.

You may want to drink some right away and refrigerate the rest. Put lids on what you want to refrigerate and let it rest on the counter until cool before refrigerating. You will likely hear the lids pop as they cool.

The picture below has NO traditional tea. It is only made with ginger, cinnamon, and turmeric. It is concentrated to reduce the space requirements in the refrigerator.


To prepare to drink:

  • Black pepper (recommended)
  • Honey or stevia
  • Optional: Ice (very refreshing cold drink in the summer, but soothing as a hot beverage in the winter or with sore throats)
  • Optional: Apple cider vinegar (to make it taste very much like apple cider)
  • Optional: 1/4 teaspoon or less cayenne pepper (for fevers and sore throats)
To drink unconcentrated - hot: Pour the beverage into a tea or coffee cup, add 1/32 - 1/16 teaspoon Stevia** or 1-2 Tablespoons of honey. Add up to 1 Tablespoon of apple cider vinegar for health reasons or just to make it taste like drinking apple cider. Top with a sprinkling of black pepper to activate the benefits of the curcumin in the beverage from the turmeric. If running a fever or having a sore throat among other ailments, add no more than 1/4 teaspoon cayenne pepper to help your body fight the infection.

To drink unconcentrated - cold: Pour into a pint or quart mason jar (especially one with a handle designed for drinking), add ice, 1/32 - 1/16 teaspoon Stevia** or 1-2 Tablespoons of honey. Add up to 1 Tablespoon of apple cider vinegar. Top with black pepper to activate the benefits of the curcumin. Hot or cold can also help with stomach upsets if sipped slowly.

To drink from concentrate: If you will be pouring the drink over ice, add the ice, then add your sweetener. For Stevia** per pint, do not add more than 1/32 - 1/16 of a teaspoon of Stevia. For honey, 1 - 2 Tablespoons is usually about right. If desired, add up to 1 Tablespoon of apple cider vinegar (with the mother) to the container. Pour half a container of the ginger tea mixture, then top off with cold filtered or tap water.

If you would like to drink it hot from refrigerated concentrate, using a microwave-safe cup, fill half with the ginger tea and half with filtered or tap water. Heat 1 cup for 1 minute to 1 1/2 minutes depending on your microwave. (No need to heat if it just came off the stove unless the added water cooled it too much.) Add 1/32 - 1/16 teaspoon Stevia** or 1 - 2 Tablespoons of honey. Add up to 1 Tablespoon of apple cider vinegar if desired. Top with a sprinkling of black pepper. You may add no more than 1/4 teaspoon of cayenne pepper if needed for fever or sore throat.

**This is the only use I have found to enjoy Stevia and I use 1/32 of a teaspoon. I get mine from Trim Healthy Mama's website. 1/32 teaspoon is one "doonk" using the included spoon in their Stevia packets. It may seem expensive, but it is a high quality product and it lasts a LONG time. https://store.trimhealthymama.com/product/pure-stevia-extract-powder-1oz-bag-2/ (Not an affiliate link.)

I have found this drink keeps me from craving soda pops (a real issue for me) and makes me feel much healthier. The recipe is my modification of Trim Healthy Mamas' "Good Girl Moonshine."

Tammy's Ranch Dressing Mix

When I first began making ranch dressing mix from scratch, I started with the ranch dressing recipe from Self-Reliance by Jamie:  http://selfreliancebyjamie.blogspot.com/2011/08/tis-seasonings.html

I still LOVE her taco seasoning mix and onion soup mix recipes and use them regularly, although we personally find the sugar in the onion soup recipe unnecessary.

Unfortunately, while the ranch dressing recipe was one that others I knew used (because they would send me theirs and it was the same), I didn't care for it as much as the store bought because of the overpowering onion flavor it had.

I tried and experimented and came up with my own recipe which follows. (Please note: different brands of garlic powder have different strengths. You may prefer to start off with a tablespoon less garlic powder and increase by teaspoons as you make up the batches. And just add a bit more garlic if needed  to your prepared ranch dressing as needed.) We like it this way.

Following the recipe as is makes a great dip when refrigerated. If you are not using it right away and want to serve it as a dressing, add 1/2 cup of milk to the mix. If you are using some now and then refrigerating the rest for later, just add milk as needed to thin the dressing.

Without further ado, Tammy's Ranch Dressing:

In a 1/2 pint mason jar, measure the following ingredients:
6 Tablespoons Onion Powder
16 teaspoons Garlic Powder
14 teaspoons parsley (4 Tablespoons + 2 teaspoons or 1/4 cup + 2 teaspoons)
8 tsp salt (2 Tablespoons + 2 teaspoons)
(Put a decorative lid, bowl, and instructions for a gift at this point if desired).
Put your seal and ring or mason jar screw-on lid on, then shake well to distribute the ingredients equally.


Here is the video for making the Ranch Dressing Mix, plus a bonus of my Season All mix for seasoning proteins such as fish, poultry, pork, and beef.

Directions:
1) For immediate use on salad or for a dip if refrigerating for a few hours:
Use 2 Tablespoons of above mixture in 1 cup of mayonnaise and 1 cup of plain yogurt. Whisk together to mix well. Use immediately and refrigerate the rest.

2) For later use as a salad dressing after being refrigerated:
Use 2 Tablespoons of the ranch dressing mixture in 1 cup of mayonnaise, 1 cup of yogurt, and 1/2 cup of milk. Whisk together well. Refrigerate.

3) Use the dressing mix on it's own in ground meats for hamburgers.

4) Make your own version of ranch, cheese, and bacon coated meat by mixing the ranch dressing mix with shredded cheddar (or your favorite cheese), and either homemade bacon crumbles or store bought real bacon pieces. Preheat the oven to 350 degrees. Put all the ingredients along with black pepper, a bit more salt and garlic powder, and turmeric if desired in a one gallon zip top bag. Put 1-2 pieces of raw meat in the bag. Shake to coat the meat. Put on a baking sheet covered with parchment or a silicon protector. Repeat for each piece. You can either put the remainder, if any, in the refrigerator to use within a week to two weeks, or just distribute the remainder on top of the meat. Bake thawed meat until it is at 160 - 165 degrees Fahrenheit, according to the type of meat. (Always use a meat thermometer to ensure the moistest meat that is done to the proper temperature.) This is great for boneless chicken, pork chops, etc.
Date: 11/20/2016 of recipe.
​Publish date: 8/21/2017

Computer Science Curriculum


In searching for a middle school or high school computer science curriculum for your student here are some points to consider:

1.      Does it include a basic history of computers? This should include:
    The first computer programmer – Ada Lovelace (pronounced “Loveless”), a woman, and the daughter of Lord Byron, the poet
    The first computer designer, Charles Babbage and “Babbage's machine”
    At least some brief history of the development of computers through the years.
2.      Does it include computer terminology?
    What constitutes a “computer?”
    A definition of computer components:
    Hardware versus software
    Hard copy versus soft copy
    Personal computer versus mainframe and mini-computers
    Closed system versus Open system computers
    Filenames and file extensions
    Central Processing Unit (CPU)
    Graphic Processing Unit (GPU), particularly important for children wanting to be game developers or testers
    Random Access Memory (RAM) – a bonus would be to understand sequential access from a historical perspective
    Read Only Memory (or ROM)
    BIOS (Basic Input / Output System)
    Hard disk and floppy disk
    A brief discussion of SCSI, IDE, SATA devices and the pros and cons of each
    Attaching devices using: USB, Firewire, PCMCIA, and PCI slots
    Operating system – What constitutes an operating system? Examples of modern operating systems such as UNIX, Microsoft® Windows, Apple's iOS, LINUX, Android, and others.
    Understanding office productivity software:
    What is a word processor? Topics should include fonts, styles, margins, page layout, heading, footer, header and body styles, margin justification (left, center, right, and justified or newspaper-style margins), numbered outlines, bulleted text, setting tab stops, inserting tables, using spell checker, thesaurus, and word and character count functions.
    What is a spreadsheet, including terms for rows, columns, and cells? Topics should include functions and formatting for dates, numbers, currency, and text. Ideally, the curriculum will also include some best practices, including using an apostrophe character (') in front of the numerals for a zip code to indicate that it is a text number, not one on which mathematical calculations will be performed.
    What is presentation software?
    What is publishing software?
    Drawing and photo editing software examples should also be included. This should provide information about the various types of images and the pros and cons of each, basic drawing and picture editing terminology, and possibly some more advanced drawing and editing examples and tools. Adobe Photoshop is a really excellent product for creating some more advanced images and budding graphic designers. Learning to create icons is helpful for the budding computer programmer. / web designer. Animation creation and editing software is a great tool for anyone interested in movie making or game development.
    Ideally, the curriculum would give examples of when it is best to use each type of product, along the lines that one could use a screwdriver to beat a nail into a wall, but a hammer is more efficient; however, if one needed to screw a screw into a board, a screwdriver works much better than a hammer.
    Communication protocol, for example:
    DON'T TYPE IN ALL CAPITALS OR THE READER WILL THINK YOU ARE YELLING. I had a customer contact me who was typing her résumé in all capitals. This is a very unprofessional way to create a  résumé. Additionally, some spell checkers may not catch mistakes when typing in all capitals, hence the reason the woman called.
    While we are on the topic of  résumés, extra large fonts or extra wide margins used to allow one to fill a page when one has little to no work experience is unnecessary.
    Don't use multiple exclamation points!!!
    Do use correct spelling and punctuation, especially in professional communication.
    Networking terminology:
    At a very minimum, modern terminology should be covered to include:
    CAT-5 cable
    MODEM, router, bridge, brouter
    Repeater
    Hubs and switches
    TCP/IP and IP address
    Network Interface Card (NIC)
    Local Area Networks
    Ethernet and WiFi
    Transfer rates
    Dial-up, DSL, Satellite access
    Internet, world wide web, intranet
    Servers and client computers
    Peer-to-peer networks
    There are many other networking terms that could be included, but these are the most important for students at this stage
    Internet access
    Browser and examples of browsers
    Internet safety. This should be a special topic to help your child learn how to protect himself or herself on the Internet. This is a time that would be especially good to reinforce house rules and go over the potential dangers of the Internet. Examples include: Not using last names or creating a pseudonym, do give out phone numbers or addresses, do not tell the name of the city you live in, the name of the teams played on or where they play, the color or number of the jersey worn.
    Viruses, adware, and malware: What are they? What kind of damage can they do, and how do we protect our computer and our information?
    Web sites and types including web page, web logs (aka “blogs”), stores, and search engines
    Electronic mail (e-mail)
    Web hosting
    Hypertext markup language (HTML)
    Dynamic HTML (D-HTML)
    Extensible markup language (XML)
    Style sheets (CSS)
    The curriculum should include examples of each and directions for creating these.
    What you see is what you get (WYSIWIG)
    FIFO and LIFO (First in / first out; last in / first out)
    Graphic User Interface (GUI)
    Computer Programming
Note: Before beginning the computer programming section, your child should have successfully completed the math topic of converting between binary and decimal . If your math curriculum includes converting between binary, decimal, and hexadecimal, that is a bonus.
    Why do we call computer glitches “bugs?”
    What is “machine language?”
    An understanding of different types of programming languages and types. This should include the difference between compiled and run-time, or interpreted, languages, the pros and cons of each, and examples of each type of language, not necessarily between the programming languages themselves. An example of a compiled language is C++. Examples of interpreted languages include script languages such as JavaScript and VBScript. An example of a programming language that is both a compiled and interpreted includes Visual Basic as it compiles to an intermediate language (IL), then converts the intermediate language to machine language at run-time.
    Object-oriented programming
    Executables
    Threads
    Multi-tasking
    Handles
    For Microsoft® Windows programming, one should also have an understanding of the registry and globally unique identifiers (GUIDs).

Following are some options for computer science resources:
Software development web sites to look at:

Compiled versus Interpreted Languages
http://www.vanguardsw.com/dphelp4/dph00296.htm

Visual Basic: Compiled or Interpreted? http://stackoverflow.com/questions/6002955/visual-basic-net-compiled-or-interpreted

Access: Visual / Access Basic is Both a Compiler and an Interprer
http://support.microsoft.com/kb/109382

Computer Tutorials, specifically Visual Basic tutorial
http://www.tutorialized.com/tutorials/Visual-Basic/Introduction-to-Visual-Basic/1

Visual Basic Tutor
http://www.vbtutor.net/index.php/vb2010-lesson-1-introduction/

XML Introduction
http://www.xmlfiles.com/xml/xml_intro.asp

Internet Security


We've all heard how important Internet Security is. Maybe you or someone in your family has had information compromised, credit or debit card information stolen, your identity stolen, your computer crash temporarily or even irrecoverably, or had someone stalk you or your children because of another person gaining access to personal information. The problem, sadly, is pervasive in today's society. If your information has been compromised or you have suffered through one of these circumstances, please feel free to comment on what you have done to rectify the situation and how you work to prevent this in the future.
How can you protect yourself and your family?

  1. Make sure you have a current Internet security system. An Internet security system includes Anti-virus, anti-adware, and anti-malware products as well as means to detect and protect your computer environment from people who are sniffing to detect key information traveling through the Internet.

I have been using anti-virus programs beginning in around 1995. Working in an industry where we shared information internationally among co-workers and customers, we had to be particularly careful about ensuring we had no viruses. While we had anti-virus products on our local computers, we learned the hard way that we needed a secondary anti-virus program of a different sort to ensure that our data files were not sent out with viruses attached. The secondary anti-virus scanner we used was PC-cillin by TrendMicro.

I also worked for a company that created corporate Internet security software. One of the lessons I learned from that experience is that no anti-virus or Internet security software will be 100% secure. The reason is this, someone has to originally invent a virus or other malware. Until it is invented, it cannot be tested for and identified. It is very similar to human illnesses. If the disease has never occurred, there are no tests to identify the disease until it causes harm. Once that happens, companies create tests to quickly identify the specific type of germ that causes the disease, not only that, but these tests can be broadened to identify mutations of those germs that may occur.

That is what anti-virus software programs do. They identify a pattern or marker in a computer virus. Once that happens, they can broaden the scope to find copycat viruses that could cause harm.

When I began my own computer consulting business in 2002, I found that while many people had anti-virus software, there tended to be four specific problems:

(1) They let the anti-virus expire and it did not have the latest virus definitions to catch problems

(2) They purchased a product that stated it would protect from adware and malware, but the product installed without protecting the person's computer by default and finding the setting was hidden, not something that a regular person could do.

(3) Someone accessing the computer went to websites that are known for problems, including pornography sites, some gambling sites, and even those sites that look like so much fun and create so much trouble on one's computer. I even had a corporate customer who insisted on allowing users to install and use a program that had a variety of smiley faces when this was a known malware product. As I was, in turn, a customer to my customer for the type of service provided and the business had the information of thousands of customers and their sensitive data, I refused to allow that as it would send information to another site. Many times, in order to access those types of web pages that cause harm, one would have to override the anti-virus settings. Once the virus is on the computer, they deliberately disable the anti-virus functionality to protect your computer.

(4) The person installed or used a factory installed anti-virus, even one that they maintained, that simply did not do the job well and did not keep up well with the viruses, adware, and malware. One of my business customers continually had problems with her computer and adware, though she kept the anti-virus software up to date. I kept having to fix her computer. I checked for the problem with the anti-virus software company she used (a high-profile common anti-virus company that is commonly pre-installed on computers), another well-known anti-virus company, and a third that I had consistently had luck with. Only the third, TrendMicro could properly identify the problem and provide a solution for rectifying it. That has consistently been my experience the past 10 years of providing computer consulting and computer support. As she had just purchased a renewal of her existing anti-virus software, she kept it. A short time later, I happened to be in her office when her computer started acting up again. We got her data transferred to another computer in the nick of time. Her computer completely and irrecoverably crashed. She had to purchase a new computer to replace it. At that time, she changed and opted to use TrendMicro's solutions.

Author's note: I do not receive any reimbursement or benefit to recommending TrendMicro's products. I recommend them solely based on my experience in using them in the course of the past 10 years as a computer consultant.

At this time, I recommend more than an anti-virus solution, but an Internet Security solution that can help protect you and your family from going to a web site that seems harmless, but has reports of spreading viruses or other malware to those who go to the page.

This type of software also provides a firewall between your computer and the rest of the Internet world. There are hardware firewalls that can be installed between the Internet and a switch or hub, and firewalls that can be installed just inside the local area network, and software firewalls that are installed directly on a computer. For home users in a peer-to-peer network (there are no server computers), an Internet Security software is sufficient.

Do not allow anyone on your home network that does not have current anti-virus software installed. If “John” comes over to visit with “Sam” and wants to bring his computer and hook it up to your network so he has access to the Internet, make sure his anti-virus software is current and that he has the latest signatures updated before doing so. You do not need a compromised computer compromising your home computer network.

2.      Secure your Internet access device. Modern MODEMs that you will receive to give you access to the Internet for DSL, satellite, or cable connectivity generally come with secure authentication codes, specifically those with Wi-Fi capability. Make sure to keep your network secured. Otherwise, you can have people driving by, neighbors in your apartment complex, or others who can gain access to your home network and networking devices.

3.      Use secure passwords for EVERYTHING. If your personal computer does not have a secure login password (8 characters or more including upper and lower case characters, special characters, and numerals), make one. This can keep little Johnny from coming over and playing on your computer and putting “neat stuff” on there that can cause your computer to be anywhere from lethargic to entirely crashed. It can also help to prevent others from accessing your computer remotely. There are a variety of reasons why this is not entirely foolproof, but there is no point making it easy for someone to hack your computer. Unless they really want what you have, if it is too time consuming, they will move on to someone who is easier to hack.

One of my customers used a small local company's Internet service. They provided radio-based Wi-Fi in the community. Each company or family that used the service received a radio antenna to attach to their home to access the Internet. Sadly, this service was entirely unsecured. I could browse to “My Network Places” and see people's home computers, shared printers, access their computer and more. That was really scary. (No, I did not hack the computers, but someone who had a desire to do harm could readily have done so. It was an open door invitation.)

If you can see other people's computers that are not your computers from My Network places, if you do not have a firewall, they can see yours as well. This would be a critical time to purchase a hardware firewall that went between the Internet and your local area network at home so that you could share files and printers with your family, but not with all your neighbors.

4.      When sharing a computer, make sure that each person has their own login and password, preferably a reduced permissions account, not Computer Administrator. You may even want to give yourself (if you are the computer guru in the house) a reduced permissions account for yourself to use whereby you could not accidentally install malware on your computer, and a Computer Administrator account for installing software and updates on the computer for the family to use.

If you work somewhere that only certain people have access to the Internet, do not give them your password to access the Internet, even if you want to be nice. Recommend the local library or other such source for them. One of my business clients only allowed certain people access to the Internet in order to protect the data they had and their network. One employee wanted to help out a young lady who needed to register for classes at a local junior college and gave her the password to access the Internet. She told him afterward that while she was there, she installed a weather-monitoring software for him because she thought he would like it. This was not her computer. This was not authorized software for the company. Within a short time, his computer started failing. His was one of two computers in the company that had certain critical data and applications on it for the business. His computer had to be completely reformatted and reinstalled just because the man wanted to be nice and helpful.

5.      Do not use a business's autodraft feature for withdrawing funds from your account if at all possible. While the company may make every effort to secure your information between your computer, across the network to their server, and try to vet out employees who may have any criminal background, there are still times when someone gets through the cracks. Once your data is stored on their servers, it is there for someone to gain access to. While a hacker may work to gain access to personal information from outside of a company, it is far easier to do so within the company.

I had never had my credit or debit card information stolen until I decided to save a few dollars with my insurance company and allow them to autodraft from my card. This meant storing my account information on their servers. Within the month, my account was used for two small, but unusual drafts. Fortunately, the bank's credit and debit company caught this and called me. I canceled that card immediately and got a new one. I thought at first this was a different business that did this based on some information I received from the person, though I had not had a problem in five years with that business. I canceled that account with that business that I thought caused the problem right away. I then tried again with the insurance company and kept an eagle eye on my bank account. The same thing happened. I contacted the insurance company. They assured me that they had no reports of problems and that they secured people's data. I tried a third time. Again, within a short time, the same thing happened. This time, no other business at all had the account number. I disabled the autowithdrawal capability with that company.

6.      Protect your identity. Do not use your real name if possible if you are Absolutely do not use your children's real names in public forums.

Why We Homeschool


It all started in 2003 when I married my dear husband who had two boys. He had reared them for the past few years with the help of his mother while he worked. She passed away in 2001, so it was up to him to do that by himself.
The boys were typical boys – they loved everything outdoors and did not like sitting still for long.
They went to a small school, but were making poor grades. They just hurried through their assignments so they could be done with them, but they were not learning the material. When children bring home C's and D's from school and they have a class of 10 or less children they are simply not doing their school work.
At this time, the school had a no homework policy. Everything was done in school, so a parent had no idea how the children were doing until report cards came out unless they checked up on the students. I wound up doing the latter. I required DS2, we'll call him “Lucky Charms,” to bring home his history and science each day so we could review the material and ensure he comprehended it. I could not get the math teacher to send home assignments to practice and review. The English teacher was another story.
In doing this, his grades got much better – from a C to an A in science. We would stay up from the time he got home until 8:00 pm each night going over homework. When I was blessed with extra consulting work that meant I was not home right when school let out, he conveniently forgot each night to bring home his books. His grades plummeted. Strike 1.
He's a cutie. He has these blue eyes that can beg better than any little puppy ever thought about. One weekend, he begged to go to a wrestling match with a friend. Where is your report card? “They didn't hand them out,” said he on Wednesday. “I forgot it at school,” said he on Thursday. On Friday, he brought me a report card, from the previous six weeks. Did I mention he's cute and could beg well? So, against my better judgment, I let him go. I went to the school Monday to get his report card and discovered why the excuses came. I also learned that he had informed his science teacher that he would not be able to study for Monday's science test over the weekend because he was going to be at a friend's house. (This is before I gave him permission, but do you think he felt he had me wrapped around his little finger? Yep.) Boy, oh, boy, was he in trouble after that one. Strike 2.
Strike 3 came when we studied history and the end of chapter assignment told him to “summarize” a section. In 7th grade, he did not know what the word “summarize” meant. That was ridiculous.
When I took into account that he was not learning his math well, we were working together until 8:00 pm each night, and I could not work outside the home on any significant project because he simply did not have the self-discipline and foresight to recognize what he was doing to himself and his future, we decided to homeschool.
It was not easy, but he learned a great deal from that. We both did.
DD2, Pumpkin, was not quite one when we began homeschooling. She was blessed with getting to grow really close to her older brother during this time. We read a great deal together. By age three, she was helping me mix ingredients in the kitchen and help wash dishes. She also began reading by that age. At age 9, she is a voracious reader and reads large chapter books on her own.
DD3, Sweet Pea, is also home schooled and began reading at age 4. For the younger two children, they are able to work more on things they enjoy and take the time they need to master more difficult items. For example, handwriting was a huge challenge for Pumpkin because she was so ambidextrous. After watching each boy write with the hand that he did nothing else with, one right and the other left, I gave her the time to get comfortable. She has some of the most beautiful cursive penmanship I have seen in many years, particularly for a young person.
In addition to these reasons, we are able to focus on the love of God through Jesus Christ and teach Biblical lessons and values.
These reasons and more are why our family chose to homeschool and continue to do so.