ICT Facilities in State Secondary Schools. This Presentation Computer Labs Software Lab availability Network Login Internet Connectivity Filtering Email.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

Login The process of identifying oneself on a computer,usually by entering ones username or password.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
iRequestManager for MediMizer X3
EDW647 Internet For Educators Setting Up a Gmail Account Roger W. Webster, Ph.D. Department of Computer Science Millersville University (717)
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
By Janea Tate  Skype is a software application that allows users to make voice calls over the Internet. Calls to other users within the Skype service.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
3 Is there something I should know? Exercising our rights.
Advanced Last Updated: May Class Outline Part 1 - Review –Review of basics –Review of files and folders Part 2 - Attachments –Sending.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Starter for 10 Unit 7: Using Messenger Transform IT SFT07_messenger.
The Legal Framework Can you work out which slide each bullet point should go on?!
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
General Purpose Packages
CPS Acceptable Use Policy Day 2 – Technology Session.
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Internet & Overview Internet n A network of networks n It connects computers around the world.
© 2011 Delmar, Cengage Learning Chapter 7 Managing a Web Server and Files.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Chapter 8 The Internet: A Resource for All of Us.
 Commercial- to sell or promote company products  Portal- provide a variety of everyday services  Informational- provide useful info & news  Educational-
ITEC 1001 Tutorial 1 Browser and Basics. Web browser software & Web pages The Web is a collection of files that reside on computers, called Web.
+ What You Need to Know About Copyright. + What is Copyright? “Almost everything on the Internet is copyrighted.” Copyright.
Intellectual Property Basics
Adobe Dreamweaver CS3 Revealed CHAPTER SIX: MANAGING A WEB SERVER AND FILES.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
THE SAFE AND ETHICAL USE OF TECHNOLOGY IN SCHOOLS PRESENTED BY JESSICA CHAIDEZ TECH 503.
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
XP Browser and Basics COM111 Introduction to Computer Applications.
Copyright Laws Dodge City Public Schools November 2013 Compiled By: 6-12 Academic Coaches and DCHS Librarian Approved By: 6-12 Administrators.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
The Internet and the World Wide Web Chapter Seven Teaching and Learning With Technology 3e.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
The Data Protection Act 1998
Helping patrons get the most out of eLibraries Manitoba!
Copyright material does not permit reproducing the material, publicly displaying or performing it, or engaging in any of the acts reserved for the copyright.
Laptop Tour & Reminders….
The Data Protection Act 1998
Technology ICT Option: .
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
Managing a Web Server and Files
Information management and communication
Technology ICT Option: .
The Internet and Electronic mail
Presentation transcript:

ICT Facilities in State Secondary Schools

This Presentation Computer Labs Software Lab availability Network Login Internet Connectivity Filtering & Web hosting Copyright Issues Is meant to familiarise PGCE students with the ICT facilities available in state secondary schools Area Secondary and Junior Lyceum have the same setup

Computer Labs 15 IBM Compatible PCs per lab 2-4 labs per school Projector Interactive Whiteboard Internet connectivity access

Available Software OS: Windows XP MS Office XP / 2003 Maths Specific  Derive  Cabri Geometre  Microworlds Internet Explorer

Lab Usage ICT (1*) Mathematics (1*) Computer Studies (2*) Free lab sessions are normally available  Check about procedures, booking may be necessary *lessons per week

Computer Network Login Users need a login name and password to use computers These are common to all PCs in a lab Students normally know the details ICT teachers or computer lab technician would be able to help

Structure your use of ICT Avoid nasty surprises through remote preparation Free internet searches usually do not get you anywhere Be sure that sites that you intend using are available Always have Plan B

Internet Connectivity Filtered internet  advantages  disadvantages White-listing  Additions to white-list Chat  or Instant Messaging unavailable

SchoolNet Portal A collection of links to interesting sites categorised by subject ‘Contact Us’ includes a form to request additions to white-list Google is available

Submitting additions to white-list If there’s a site you need to use for one of your lessons Go to Click Add URL in Contact Us menu Fill in form You will be notified by e- mail when/if site is added

& web hosting services Students are provided with a 5Mb account and 5Mb of web space This is ideal for their personal or class web page – an interesting project for students to work on

Other Facilities Media Room:  with a VCR  Cable TV  large screen  need to be booked Overhead projectors  very often under-used  need to be booked?

The Internet & Copyright Is material on the Internet protected by copyright? Under Maltese law copyright material sent over the Internet or stored on web servers will generally be protected in the same way as material in other media. Anyone wishing to put copyright material on the Internet, or distribute or download material that others have placed on the Internet, should ensure that they have the permission of the owners of rights in the material.

Copyright and Fair Use If you make a copy from an electronic source, such as the Internet, for your personal use, it is likely to be seen as fair use. However, if you make a copy and put it on your personal site, it is less likely to be considered fair use. The Internet IS NOT a public domain. There are both un-copyrighted and copyrighted materials available. Assume a work is copyrighted. ©

© Tips for the Internet Always credit the source of your information Find out if the author of a work (e.g., video, audio, graphic, icon) provides information on how to use his or her work. If explicit guidelines exist, follow them. Whenever feasible, ask the owner of the copyright for permission. Keep a copy of your request for permission and the permission received.

Data Protection Act The information to be contained in personal data shall be obtained, and personal data shall be processed, fairly and lawfully. Personal data shall be held only for one or more specified and lawful purposes. Personal data held for any purpose or purposes shall not be used or disclosed in any manner incompatible with that purpose or those purposes. If your computer system holds information about individuals, then you have a moral and legal duty to treat that information with respect

Personal data held for any purpose or purposes shall be adequate, relevant and not excessive in relation to that purpose or those purposes. Personal data shall be accurate and, where necessary, kept up to date. Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. An individual shall be entitled at reasonable intervals and without undue delay or expense to be informed by any data user whether he holds personal data of which that individual is the subject; and access to any such data held by a data user; and where appropriate, to have such data corrected or erased. Data Protection Act

Suggestions or Questions?