How to avoid stress and frustration when using tech tools in your classroom

All teachers know that if time is taken to set up strong routines and systems at the start of the year, classrooms operate more smoothly – this is particularly true for primary classrooms. Junior classroom teachers always astound me with their patience when helping students to learn these routines, reinforcing and maintaining strong consistent messages. Classroom management techniques are a cornerstone for setting up a classroom where risks can be taken, fun can be had and learning can be engaging and exciting. 

The same MUST happen if the use of digital tools in the classroom is going to become a part of learning that is integrated and embedded. I’ve had so many teachers tell me that they don’t really bother with the iPads as a learning tool as the classroom falls to pieces whenever they come out. I’ve heard the same about STEAM equipment – “it’s distracting, kids can’t concentrate on the learning”. If time is taken at the beginning of an academic year, or when new tools are introduced, to set up boundaries, expectations, routines and systems then the frustration from the above should be minimal!

[bctt tweet=”Do you have strong routines and systems for device use in your classroom? Click here to see how! #utbPD #digitaltech #Edu”]

I thought I’d share a few of the tips that the UTB team often give to teachers that go a long way to helping set up good habits for device/tool use within the classroom. 

Clear, consistent expectations

Be it iPads, Chromebooks, laptops, desktops or any other equipment – simple, clear guidelines for how these should be used needs to be taught EXPLICITLY, repeated often and students supported to understand why it matters. When I’m working with a class (even if it’s a one off lesson) I always start by telling them the words or signals that I will use when I’m ready for them to stop what they are doing and listen. I explain that I understand that sometimes they might feel frustrated when I stop them as they may not be finished what they were trying to do. I let them know that I won’t stop them for long and I’ll try really hard to make sure that what I say is important! I also tell them that I totally empathise that sometimes sneaky laptops or iPads jump back into our hands and force us to use them against our will! Hey – it used to happen to me all the time – especially during meetings! 

These are what I expect students to do when I indicated that I would like them to listen:


“Apples Up” – this means that students will put their iPads down on a table (or on the floor in front of them if they are sitting on the floor), screen down and Apple logo up. Hands must be off the iPad.


“Shark Attack Mode” or “45 Degrees”

Simple – close your screen to 45 degrees. With younger students we call this ‘Shark Attack Mode’ – your computer is like a shark’s jaws – you wouldn’t put your hands in a shark’s jaws would you? This means that applications shouldn’t shut down (this is annoying for everyone!) but makes it really hard for students to keep working while you are talking.

This is also great if you are working step by step through something with your students – you can quickly see who might need your help if they are going to ‘Shark Attack Mode’ when they complete each step. They’ll help each other out really quickly too. 

Some students still struggle so I’ll introduce a level system. What I’ve just described is Level 1. Level 2 is that you turn the jaws of the shark so they are facing away from you. Some students do this immediately as they recognise that the draw from the screen is just too much for them. Level 3 – I hold out my hand, they give me the laptop to hold until I’m finished speaking, then I hand it back. The first time this happens – no problem, we all need support sometimes. If it happens often, then we need to talk.

[bctt tweet=”Are you pulling out your hair trying to get your students’ attention when they are on devices? Click here for some tried and tested tips and tricks to ease that pain! #utbPD #digitaltech #Edu”]


If your students are old enough to have their own login, they should also have their own passwords. If we are starting them off having the same school generated password as all their classmates, their very first lesson around passwords is that they don’t matter. 

Help your students to develop passwords that are personal but easy to remember. There are loads of ideas out there for how to develop them and with guidance even your youngest learners can create their own and memorise it. Help them with this process. Schedule it into your start of year routines. Talk about why passwords are important. Give them some ideas for making it then let them practice typing it somewhere so they develop some muscle memory. Older students will need to learn about this too – as may many of your colleagues! 

Here are some resources to help:

Sam’s great blog post
Common Sense Education
Create and Safeguard Passwords – lesson from Google

[bctt tweet=”Who teaches your students about creating strong passwords? Click here for some ideas for how to do just that! #utbPD #digitaltech #Edu”]


If your students are sharing classroom devices it may pay to label them so they know which ones they have been working on. This is not such a big deal for devices that are connecting to the cloud and work is stored there, but for iPads when apps are used that store files on that particular device, students being able to quickly find where their creations are independently will free you up from having to help them with that. 

A suggestion that teachers like for iPads is to print and laminate some large apple shaped clipart and write students names on them. Make sure you spread the children that work in the same learning groups across the different devices so that they are available when it’s group work time. The reason why I suggest an apple shape is so that you can stick these on any covers and use a command like ‘Apples up’ and it will make perfect sense! If you often share iPads with other classes – use different coloured apples for each class. 

Empower them

Teachers laugh when I say this but it happens a lot when I’m working with adults. We’ll go to use an app to record a video and when they go to start it a pop-up comes up and asks if that site can access the camera and microphone. So often teachers will stop me and ask me what to do. This is because we have been trained to fear anything that pops up on our screens and so many adults (let alone students) panic before they even read it. Use these moments in your classroom to empower your students to read and make an informed decision about what to do. If they really aren’t sure after reading it – definitely ask for help – but so often it’s an obvious, straightforward choice that we need to teach them to think through and action independent of us. If we, the classroom teacher, have to answer that question twenty times in one lesson, no wonder we are reluctant to get those devices out again.

Time to Explore and PLAY

Technology is exciting. It’s engaging and our students naturally gravitate towards it. This is a huge blessing! How fantastic that they are keen to get started and so much more willing to get things wrong than we are as adults! Embrace that enthusiasm and give them time to play with new tools or apps. See what they can discover with a small prompt or challenge from you before you guide them with something more directed. They will WANT to learn from you and they will not want to stop! Take that as a win! 

So hopefully you can take a few of these suggestions and keep them in mind when getting started with your class, but remember, it’s never too late to start developing these habits with your students. 

Be honest – tell them why these routines and systems are important. You are a community of learners together and if that community is going to thrive you need to have a shared understanding of what the expectations are. If you are asked the same question over and over again – answer it for the whole class! Better yet – record your answer and share it with them to access as needed.

Be consistent; in your class, your department/team, or even your school. This may mean developing a shared language around device use as well. 

Be patient – If something isn’t working as well as it was – reset. Go back over it, the way you would with any other classroom routine or system. 

Want to learn more? Check out our other blogs here

Related Post

The right ways to enable AI at work – Tips for IT Lead

In today’s fast-paced workplace, maximizing efficiency while minimizing time spent on repetitive tasks is crucial. However, many staff members may feel unsure about integrating AI effectively, leading to missed productivity opportunities. As the IT lead, you can guide your team in harnessing AI’s power to streamline operations and save time. By providing clear guidance and


Streamline Your Workflow: Upgrade to Microsoft Graph PowerShell now!

Are you wondering what to do now that Azure AD, Azure AD Preview and MSOnline PowerShell modules are officially deprecated? It’s time to upgrade to Microsoft Graph PowerShell for a seamless experience! Simplify Your Workflow with Microsoft Graph PowerShell With the official deprecation of Azure AD, Azure AD Preview, and MSOnline PowerShell modules Microsoft Graph


Embracing Technological Change: A Leadership Guide

In today’s fast-paced world, technological advancements are reshaping industries at an unprecedented rate. As leaders, it’s crucial to navigate these transformations effectively and inspire our teams not only to adapt but thrive. The challenge comes when we want to integrate the authentic use and integration of technology as part of this change. Here are three


How well do you use the
Apple Apps Google Workspace Microsoft 365
tools in your workplace?

Find out if you’re working with the tools OR if you’ve got the
tools working for you.

What Industry Are You In?

Using Apple Apps, Google Workspace or Microsoft 365?

What Type of user are you?

🫣 Entry User | 🤹 Skilled User | 👑 Elite User

Take the quiz to find out. 

Privacy Policy

Using Technology Better Privacy Commitment


We hold the privacy of your personal information in the highest regard.

Using Technology Better regards customer privacy as an important part of our relationship with our customers. The following privacy policy applies to all Using Technology Better users, and conforms to Internet privacy standards.

This policy will be continuously assessed against new technologies, business practices and our customers’ needs.

If you have questions or concerns regarding this statement, you should first contact the support team on our Contact Us Page.

Collection of Information

In order to use the Using Technology Better website, we may require information from you in order to provide the best service possible.

All correspondence may also be collected and stored, particularly in regard to sales, support and accounts, including Email.

Any information collected by Using Technology Better is collected via correspondence from you or your company. This may be via the telephone, Email, mail, fax or directly through our website.

Visitors and customers of will have their information shared back to DAIWABO INFORMATION SYSTEM CO., LTD. and DIS Service & Solution Co., Ltd.

Use of Collection Information

Any details collected from Using Technology Better customers is required in order to provide you with our

products and/or services, and a high level of customer service.

Correspondence is recorded in order to provide service references, and to assist in our staff development.

Web Site Use Information

Similar to other commercial Web sites, our Web sites utilize a standard technology called “cookies” (see explanation below, “What Are Cookies?”) and web server log files to collect information about how our Web site is used.

Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Web site, and the Web sites visited just before and just after our Web site.

Storage of Collected Information

The security of your personal information is important to us. When you enter sensitive information (such as credit card numbers) on our website, we encrypt that information using secure socket layer technology (SSL).

When Credit Card details are collected, we simply pass them on in order to be processed as required. We never permanently store complete Credit Card details.

We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it.

If you have any questions about security on our Website, you can email us at <ContactEmail>.

Access to Collected Information

If your personally identifiable information changes, or if you no longer desire our service, you may correct, update, delete or deactivate it by emailing us at <ContactEmail>.


If you purchase a product or service from us, we may request certain personally identifiable information from you.

You may be required to provide contact information such as:



Postal address

Your school or organisation

Financial information (such as credit card number, expiration date, name on card, card billing address).

We use this information for billing purposes and to fill your orders. If we have trouble processing an order, we will use this information to contact you.


Using Technology Better uses personally identifiable information for essential communications, such as


Accounts information

Critical service details.

We may also use this information for other purposes, including some promotional Emails.

If at any time a customer wishes not to receive such correspondence, they can request to be removed from any mailing lists by contacting support.

You will be notified when your personal information is collected by any third party that is not our agent/service provider, so you can make an informed choice as to whether or not to share your information with that party.

Third Parties

Using Technology Better may at its discretion use other third parties to provide essential services on our site or for our business processes.

We may share your details as necessary for the third party to provide that service.

These third parties are prohibited from using your personally identifiable information for any other purpose.

Using Technology Better does not share any information with third parties for any unknown or unrelated uses.

What Are Cookies?

A cookie is a very small text document, which often includes an anonymous unique identifier. When you visit a Web site, that site’s computer asks your computer for permission to store this file in a part of your hard drive specifically designated for cookies.

Each Web site can send its own cookie to your browser if your browser’s preferences allow it, but (to protect your privacy) your browser only permits a Web site to access the cookies it has already sent to you, not the cookies sent to you by other sites.

Browsers are usually set to accept cookies. However, if you would prefer not to receive cookies, you may alter the configuration of your browser to refuse cookies.

If you choose to have your browser refuse cookies, it is possible that some areas of our site will not function as effectively when viewed by the users.

A cookie cannot retrieve any other data from your hard drive or pass on computer viruses.

How Do We Use Information We Collect from Cookies?

As you visit and browse our Web site, the site uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security.

Cookies, in conjunction with our Web server’s log files, allow us to calculate the aggregate number of people visiting our Web site and which parts of the site are most popular. This helps us gather feedback to constantly improve our Web site and better serve our clients.

Cookies do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.


We reserve the right to disclose your personally identifiable information as required by law and when we believe that disclosure is necessary to protect our rights and/or comply with a judicial proceeding, court order, or legal process served on our Website.


Links on the Using Technology Better site to external entities are not covered within this policy. The terms and conditions set out in this privacy statement only cover the domain name of

Changes to Privacy Policy

If we decide to change our privacy policy, we will post those changes to this privacy statement, and other places we deem appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.

We reserve the right to modify this privacy statement at any time, so please review it periodically. If we make material changes to this policy, we will not use the personal information you have submitted to us under this Privacy Policy in a manner that is materially inconsistent with this Privacy Policy, without your prior consent

Delivery Policy

Most goods are digitally delivered instantly via email.  Our services may be delivered either via an online medium or live in person.

For our online delivery see below.  For services delivered live onsite, please refer to our speaker agreement form which is emailed to you on confirmation of booking.

Refund Policy

We do not offer refunds or returns unless we cannot supply goods or services or the goods or services are not delivered as promised.

Australian law is the governing body for all work, goods and services supplied by Using Technology Better.

Marketing Release

Using Technology Better (UTB) may film, record, and photograph me (the results of which are the “Recordings”). UTB may also incorporate into any production(s) any separate content (e.g., quotes, testimonials, biographical information, profiles, photos, videos, sound recordings, artwork, etc.) I provide to UTB or approve in writing (“Materials”).


I grant to UTB an irrevocable, perpetual, worldwide, royalty-free license to, in its sole discretion, (i) edit, translate, and modify the Recordings and the Materials, (ii) attribute the Recordings and Materials to me by my name, age, and city and state of residence, (iii) incorporate the Recordings and the Materials into content to promote UTB, its programs, or products (“Content”), and (iv) publicly use, distribute, reproduce, create derivative works from, and perform/display the Content, and any excerpts thereof, in any language.

2. No Compensation.

I grant this permission without any financial or other obligation of any nature.


For any issues or concerns please contact us